CTF

Capture the Flag (cybersecurity)

Articles
Attack

My CTF Methodology

In this post, I examine the steps I take to approach a typical CTF in the form of a vulnerable target (also known as boot2root), and elaborate on steps at each phase.

By 0xBEN
5 months ago