Skip to main content

CAPTURE THE FLAG(CTF)

What Is CTF?

Capture the flag

Types of CTF

CTF may conduct in two types:-

Types of CTFChallenges:

How To Get Started?

CTF list to Play and Practice now

Tips to Win CTF?

Tools And Resources

Resources:

Comments

Popular posts from this blog

Extract Information From IP Address

Before Enter into the blog a small Disclamier use this for Educational and Research Purposes only. Don’t do this for any illegal activity the creator is not responsible for your activity. This is only for OSINT Investigation. There are several ways to get information about IP address. But this tool can give infomation about IP and detect the the IP is using VPN or Not. This tool is completely developed with python. Open Terminal, you can use google cloud console terminal also. Go to https://github.com/maari-krish/Ipinfoga Clone the Repository. Follow the Installing Steps which mentioned in github repository. Here i hide the IP. You please the enter the ip and move on.You can open the gps location in your browser which it is precised location not the exact location of the IP. To detect the IP is using vpn it is in different repository. But i combined the code and give it. Source code is given below. Go to https://github.com/maari-krish/Vpn-Detector Follow the steps given in the reposito

Top Ransomeware attacks in 2021?

The number of ransomware attacks nearly doubled in the first half of 2021. According to research, 1,097 organizations were hit by ransomware attacks in the first half of 2021. In contrast, our 2020 report found 1,112 ransomware attacks for the entire year. Also in 2021 major companies were affected by ransomeware attacks. Ransomeware πŸ˜‚πŸ˜‚ Before enter, a small definition about ransomeware for the people who doesn’t know anything about ransomeware. πŸ˜†πŸ˜†πŸ˜† What is Ransomeware? Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In simple words I think now cleared about ransomeware. Top ransomeware attacks in 2021? Big compaines be like🀣. Colonial Pipeline Company The Colonial Pipeline attack made such an impact because the pipeline is an important part of the national critical infrastructure system. Taking the system down disrupted gas s

Pegasus Spyware

What is Pegasus,how it is installed,what it does, how to be detect? For all the questions here the solution, before that we can see what is Pegasus and what it will does. What is Pegasus? Pegasus, developed by Israeli cybersecurity firm NSO Group, is a highly sophisticated spyware that has been referred to as the “most sophisticated smartphone attack ever”. Pegasus is a program that allows the controller (a person who has injected the spyware) can access to the infected smartphone’s microphone, camera, messages, emails, and collect location data also. As per a Kasp e rsky report, Pegasus even allows you to listen to encrypted audio streams and read encrypted messages. In one word to say is“ hacker has the access to the entire phone ”. Pegasus was first noticed in 2016 but it created a lot of buzz in late 2019 when it was revealed that the spyware was used for snooping on journalists and human rights activists across the globe, including in India. And now Now, It was a news Published by