PFW ACM's CTF Practice

PFW ACM's CTF Practice

Home Resources OSINT Cryptography Password Cracking Wi-Fi Analysis Log Analysis Network Analysis Forensics Reverse Engineering Web Application

Welcome!

Jump to a section that you would like to learn more about and then try the challenges in each section. Answers will be posted below each section.

See Categories →
NCL 2024 Spring PFW

Categories

Open Source Intelligence

Use publicly available information collected from search engines, social media, databases, and more to answer challenges regarding a variety of topics.

Cryptography

Identify a variety of techniques used to encrypt or hide messages and extract their hidden messages.

Password Cracking

Identify how computers store user passwords and the many pros and cons of a variety of different algorithms in use.

Network Traffic Analysis

Identify the different types of network traffic and determine what was being sent between different computers over a network.

Log Analysis

Identify between normal and abnormal operation based on logs generated by programs.

Scanning

Use specialized tools to gain more information about a target, such as programs running on the target and potential vulnerabilities.

Digital Forensics

Analyze and recover digital evidence from a computer-related incident.

Reverse Engineering

Also called enumeration and exploitation, identify exploits and vulnerabilites of code to bypass security measures in the code.

Web Application Security

Identify exploits and vulnerabilities to bypass security measures of web applications.