找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Handbook for CTFers; Nu1L Team Book 2022 Publishing House of Electronics Industry 2022 CTF (Capture The Flag),.Web.PWN.Reverse.APK.Misc.Cr

[复制链接]
楼主: 皱纹
发表于 2025-3-26 22:50:47 | 显示全部楼层
发表于 2025-3-27 02:21:50 | 显示全部楼层
APK,eal data based on the characteristics of the system to test the participant’s understanding of Android. The latter mainly examines the player’s ability to reverse Java or C/C++ codes. Challenge designers will often apply obfuscation (ollvm, etc.), reinforcement, anti-debugging, and other techniques
发表于 2025-3-27 07:27:53 | 显示全部楼层
Reverse Engineering,ng flow, organizational structure, and functional specifications of the product to produce a product with similar but not identical functions. In CTF, reverse engineering generally refers to software reverse engineering, that is, analyzing compiled executable files, studying program behavior and alg
发表于 2025-3-27 13:06:55 | 显示全部楼层
PWN,resents the “bang” of a hacker gaining access to a computer through a vulnerability. It is a slang term derived from the verb own. In short, the process of gaining access to a computer through a vulnerability in binary is called PWN.
发表于 2025-3-27 15:12:03 | 显示全部楼层
Crypto,developed with people’s growing pursuit of information confidentiality, and has become the foundation of modern cybersecurity. In recent years, the difficulty of cryptography challenges in CTF has been increasing, and the percentage of these challenges is also increasing. Compared with the Web and b
发表于 2025-3-27 18:54:55 | 显示全部楼层
发表于 2025-3-27 22:35:21 | 显示全部楼层
发表于 2025-3-28 05:58:36 | 显示全部楼层
Code Auditing, very close to reality. The essence of code audit is to find defects in the code, this chapter only takes the mainstream PHP and Java languages code audit as an example, so that the reader not only understands the CTF code audit challenges but also can accumulate some real-world code audit experienc
发表于 2025-3-28 08:41:39 | 显示全部楼层
AWD,ultiple challenges, each challenge corresponds to a gamebox (server), the gamebox of each competition team has the same vulnerability environment, the players of each team obtain the flags in the gamebox of other teams through the vulnerability to score, and avoid being attacked by patching the vuln
发表于 2025-3-28 13:04:33 | 显示全部楼层
Virtual Target Penetration Test,Compared to the CTF online competition, the introduction of penetration challenges is as simple as the web challenges, which does not require the participants to know the underlying system principles and have profound programming ability, but only requires the exploits of existing vulnerabilities, s
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-18 14:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表