Categories
The CTF has many challenge categories and some learning material about those categories are provided here for your quick reference. CTF participants are expected to perform their own research.
-
Artificial Intellegence
Artificial Intellegence (AI) is most commonly used when you are too lazy to do your own homework.
-
Cryptography
These challenges serve to hide or uncover information that was intended for select persons to use or read.
-
Digital Forensics
Also known as Computer Forensics (digital or cyber), these challenges serves to investigate techniques to identify or collect evidence. Evidence such as reviewing event logs to proactively identify bugs, security threats, or other risks.
-
GRC
Known as Governance, Risk, and Compliance that aims to focus on aligning business efforts with Cybersecurity.
-
OSINT
These challenges serve to use Open Source Intelligence (OSINT) through the use of online resources to gather information and find the flag.
-
Password Cracking
Password cracking involves using techniques and tools to gain unauthorized access to systems by deciphering or bypassing password protections.
-
Privacy
Your digital footprint will be the death of you. Don't get cyberbullied.
-
Reverse Engineering
Reverse engineering challenges often involve dissecting complex systems to understand their inner workings, which requires both technical expertise and creativity to uncover hidden functionalities or vulnerabilities. You will also take advantage of bugs or vulnerabilities to cause unintended behavior of a program.
-
Security Awareness
These challenges serve to educate and test knowledge of Cybersecurity practices of participants.
-
Social Engineering
These challenges serve to simulate social engineering campaigns that have been used in real life but shouldn't be done to others.
-
Web Exploitation
These challenges serve to exploit vulnerabilities in web applications.
-
Physical Injects
Physical interactive challenges that can only be done in person.
-
Participant Created
Challenges that have been created by CyberStrike participants and modified to be used in competitions. Participants who create and submit challenges may receive bonus points during the next competition and see if you can stump other competitors.
Info
Challenge Categories such as Physical Injects and Artificial Intellegence requires a live response during the CTF event. Live responses are submitted into your teams Discord channel and CTF Staff will review the submitted response to give points accordingly.