From d8cb023639ad49a6e529a7feb7cd47209fc4a736 Mon Sep 17 00:00:00 2001
From: stephensottosanti <63934523+stephensottosanti@users.noreply.github.com>
Date: Thu, 25 Feb 2021 16:36:39 -0600
Subject: [PATCH] Update README.md
---
UACTF/README.md | 43 +++++++++++++++++--------------------------
1 file changed, 17 insertions(+), 26 deletions(-)
diff --git a/UACTF/README.md b/UACTF/README.md
index e8a18ed..f13ff7c 100644
--- a/UACTF/README.md
+++ b/UACTF/README.md
@@ -7,41 +7,32 @@ Cyber Security Club, and the Digital Forensics and Control Systems Security Lab.
categories to choose from with each category including easy, medium, and difficult
challenges worth a varying amount of points. Clues will be available to help teams with
solving the challenges, but these clues will cost the team points. The teams’ objective is
-to solve the challenges to score as many points as possible.
+to solve the challenges to score as many points as possible.
+
Although UACTF is in the style of a competition, this is a fun educational exercise. There
are opportunities for students at all skill levels. Through UACTF, students will be provided
with opportunities to collaborate, learn, and be exposed to a different way of thinking
about cyber security. This will include thinking about possible careers in the cyber
-security field.
+security field.
+
The material in this guide has been collected from several sources across the Internet.
This guide will provide teams with a common starting point for preparing for UACTF and
is not all inclusive of the challenges involved in UACTF. UACTF is not a hacking contest.
Think of UACTF as more of a puzzle solving challenge with a cyber security theme.
Below is a list of topics that might be seen during UACTF. This should not be considered
a comprehensive list of the types of challenges that will be seen during the competition.
-•
-•
-•
-•
-•
-•
-•
-•
-•
-•
-•
-•
-Binary exploitation
-Code-breaking and decoding
-Cryptography
-Database security & SQL injection attacks
-Digital forensics
-Email analysis
-File analysis
-Network traffic analysis
-Programming
-Reverse engineering
-Social engineering
-Website security
+- Binary exploitation
+- Code-breaking and decoding
+- Cryptography
+- Database security & SQL injection attacks
+- Digital forensics
+- Email analysis
+- File analysis
+- Network traffic analysis
+- Programming
+- Reverse engineering
+- Social engineering
+- Website security
+
The following provides additional information and links for some of the challenge types
to assist the students in preparing for UACTF 2021.