/ctf/resources

What is CTF?

CTF (Capture The Flag) is a cybersecurity competition that challenges participants to solve a variety of tasks ranging from finding coordinates based on a photo to hacking your way into a server to steal data.

LIT CTF is a Jeopardy style contest: we provide a list of challenges that award points to teams that solve them. There are several categories of CTF challenges:

  • Cryptography (crypto): Decrypt mysterious messages with both classical and modern algorithms.
  • Pwn: Exploit a binary by causing buffer overflow and memory leaks, i.e. manipulating undefined behaviors to bypass their normal functionality
  • Reverse Engineering (rev): Reverse Engineer files and binaries to find corresponding flag
  • Web: Exploit a website to obtain the flag.
  • Miscellaneous (misc): Everything else, including forensics, extracting the flag from various file formats (e.g. images, audio)

To get you started, here are a couple of pages that you can take a look at:

Starter Tutorials

Practice CTFs

Upcoming CTFs