Cryptography Guide For UTAR Students
Cryptography Overview Nowadays, cryptography challenges in CTF competitions have become more difficult and more common. Unlike Web and binary challenges, cryptography tests participants’ foundation...
Cryptography Overview Nowadays, cryptography challenges in CTF competitions have become more difficult and more common. Unlike Web and binary challenges, cryptography tests participants’ foundation...
PWN Basics Do note that this guide is intended for purely beginners in CTF. Hence, the contents will be simplified as to not chase beginners away from this category. Before starting with PWN, plea...
Forensics and Steganography Overview Do note that this guide is intended for purely beginners in CTF. Hence, the contents will be simplified as to not chase beginners away from this category. In d...
OSINT Overview Open-Source Intelligence (OSINT) refers to the practice of gathering information from publicly available sources. It involves using various tools and methods to collect, process, and...
Reverse Engineering Basics and Pre-Requisites Before we learn how to reverse engineering, we need to have a few basic pre-requisites: Basic understanding of C programming language Knowing ho...