Introduction To CTF
Introduction To CTF
The
Flag
CTF
101
TABLE OF CONTENTS
What is
1 CTF 2 Web
Forensic Cryptog
3 s
Binary 4 raphy
Reverse
exploitati Engineerin
5 on 6 g
0 What
is CTF
1
Capture the flag is a cyber security
competition where teams compete
against each others to score the highest
points by finding flags which are text
strings secretly hidden in purposefully
vulnerable software or websites.
EX:OMC{Fl4g_2025}
Some photos from CTF
challenges
Securing communication by
transforming data into unreadable
formats using mathematical
algorithms.
Encryption Algorithms:
Manipulating flaws in
compiled programs to
alter behavior or control
execution.
Memory Overflows: