Hack the CTF
  • 🚩Welcome to Hack the CTF
  • Getting Started
    • ⭐Course Overview
    • ❓Why We Made This Course
    • 🔷Why CTFs are Important
    • Types of CTFs
    • Interesting CTF Info
  • Basics
    • Flag Format
    • Challenge Types (chals)
    • ✨Misc Terms & Rules
    • Tools and Methods
    • 🎮Let's Play
  • The Challenges
    • 🤔Learn, Hints, Solutions
    • 🟩EASY CHALS
      • 🟩Flag on a Function
      • 🟩Binary
      • 🟩Find and Watch
      • 🟩Lots of Them
      • 🟩Who Said This?
      • 🟩Click This Link
      • 🟩Remote Connect
      • 🟩Beeps and Beeps
      • 🟩Someone Not Use HTTPS
      • 🟩Cipher
      • 🟩Find Someone
      • 🟩CTF Page #2
      • 🟩Too Much Blue
    • 🟨MEDIUM CHALS
      • 🟨Hiding Right in Front of You
      • 🟨Base64 is the Answer
      • 🟨Hash of the Server IP Address
      • 🟨Query String
      • 🟨Literally in the Picture
      • 🟨Find the Texty Record
      • 🟨Where in the git is the Flag?
      • 🟨Websockets Delivery
      • 🟨Hacker Hid a File
      • 🟨I Hear Something
      • 🟨Where Am I?
      • 🟨Shakespeare is Hiding Something
      • 🟨CTF Page
    • 🟥HARD CHALS
      • 🟥Image Doesn't Work
      • 🟥Where is it?
      • 🟥Code Breaker
      • 🟥TV - Amateur Radio Way
  • Extra Resources
    • Where to Find More CTFs
  • Conclusion
    • Course Recap
    • 📝Quiz
    • 🦉Keep on Learning
  • SouthHills Info Request
Powered by GitBook
On this page
  1. Getting Started

Types of CTFs

Capture The Flag (CTF) competitions are broadly categorized into two main types: Jeopardy-Style and Attack-Defense.

Jeopardy-Style CTF

  • Description: Teams solve a variety of independent challenges across different categories such as cryptography, forensics, and reverse engineering.

  • Scoring: Each solved challenge (aka chal) earns points for the team, and the team with the most points at the end of the event wins.

  • Focus: Emphasizes problem-solving and knowledge across a range of cybersecurity topics.

Attack-Defense CTF

  • Description: Teams are provided with vulnerable systems and tasked with defending their own systems while attacking others.

  • Scoring: Points are earned by successfully defending against attacks and compromising the opponents' systems.

  • Focus: Simulates real-world network security scenarios, requiring both offensive and defensive skills.

Our CTF is a Jeopardy-Style with multiple categories and leveled with easy, medium, and hard challenges even though all of these challenges would typically be mainly be considered easy at a competitive CTF competition.

PreviousWhy CTFs are ImportantNextInteresting CTF Info

Last updated 5 months ago