At its core, a CTF is both a learning tool and a game, making it a fun and interactive way to dive into cybersecurity, whether you’re a beginner or a seasoned professional. CTFs usually come in three categories: Jeopardy-style, Attack-defense, and Mixed or King of the Hill.
Category: picoCTF
JPCERT shares Windows Event Log tips to detect ransomware attacks
The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.
Top 10 Open-Source Intelligence Tools (OSINT)
OSINT tools help access, collate, and organize relevant data based on queries within the various tools. Organizations wanting to develop an OSINT practice should consider what approach they should take when leveraging these tools.
Extracurriculars Matter To You and To Colleges – BigFuture
High school is a time to try new things, learn new skills, and develop new passions. While grades and test scores are important, colleges also want to see the person you’re becoming and the skills you’ve learned outside of class. They want to know what makes you unique, and the extracurricular activities you participate in will help you stand out.
pico Information – cat photo
This one seemed easy, then turned out to be more difficult than originally thought. Most people were looking for the flag in the image properties and information. However, most people…
pico Speeds and Feeds
This is is easy to overlook even if you get the code from the hint. First step, take a look at the hint. This is where doing some research on…
pico Wireshark doo do dooo do
This one is a bit more challenging and can be tedious for those who have not used Wireshark. Download the pcap file. Open Wireshark from the C:\APPS\CTF\NETWORKING folder on your…
pico Tab Tab Attack
This required me to unzip the file. Get to the final file and use the Open With option. The program to open this is bintext app in the following folder…