From d8cb023639ad49a6e529a7feb7cd47209fc4a736 Mon Sep 17 00:00:00 2001 From: stephensottosanti <63934523+stephensottosanti@users.noreply.github.com> Date: Thu, 25 Feb 2021 16:36:39 -0600 Subject: [PATCH] Update README.md --- UACTF/README.md | 43 +++++++++++++++++-------------------------- 1 file changed, 17 insertions(+), 26 deletions(-) diff --git a/UACTF/README.md b/UACTF/README.md index e8a18ed..f13ff7c 100644 --- a/UACTF/README.md +++ b/UACTF/README.md @@ -7,41 +7,32 @@ Cyber Security Club, and the Digital Forensics and Control Systems Security Lab. categories to choose from with each category including easy, medium, and difficult challenges worth a varying amount of points. Clues will be available to help teams with solving the challenges, but these clues will cost the team points. The teams’ objective is -to solve the challenges to score as many points as possible. +to solve the challenges to score as many points as possible.
+ Although UACTF is in the style of a competition, this is a fun educational exercise. There are opportunities for students at all skill levels. Through UACTF, students will be provided with opportunities to collaborate, learn, and be exposed to a different way of thinking about cyber security. This will include thinking about possible careers in the cyber -security field. +security field.
+ The material in this guide has been collected from several sources across the Internet. This guide will provide teams with a common starting point for preparing for UACTF and is not all inclusive of the challenges involved in UACTF. UACTF is not a hacking contest. Think of UACTF as more of a puzzle solving challenge with a cyber security theme. Below is a list of topics that might be seen during UACTF. This should not be considered a comprehensive list of the types of challenges that will be seen during the competition. -• -• -• -• -• -• -• -• -• -• -• -• -Binary exploitation -Code-breaking and decoding -Cryptography -Database security & SQL injection attacks -Digital forensics -Email analysis -File analysis -Network traffic analysis -Programming -Reverse engineering -Social engineering -Website security +- Binary exploitation +- Code-breaking and decoding +- Cryptography +- Database security & SQL injection attacks +- Digital forensics +- Email analysis +- File analysis +- Network traffic analysis +- Programming +- Reverse engineering +- Social engineering +- Website security + The following provides additional information and links for some of the challenge types to assist the students in preparing for UACTF 2021.