Update README.md
This commit is contained in:
committed by
GitHub
parent
eafb4addc6
commit
d8cb023639
@@ -7,41 +7,32 @@ Cyber Security Club, and the Digital Forensics and Control Systems Security Lab.
|
|||||||
categories to choose from with each category including easy, medium, and difficult
|
categories to choose from with each category including easy, medium, and difficult
|
||||||
challenges worth a varying amount of points. Clues will be available to help teams with
|
challenges worth a varying amount of points. Clues will be available to help teams with
|
||||||
solving the challenges, but these clues will cost the team points. The teams’ objective is
|
solving the challenges, but these clues will cost the team points. The teams’ objective is
|
||||||
to solve the challenges to score as many points as possible.
|
to solve the challenges to score as many points as possible.<br>
|
||||||
|
|
||||||
Although UACTF is in the style of a competition, this is a fun educational exercise. There
|
Although UACTF is in the style of a competition, this is a fun educational exercise. There
|
||||||
are opportunities for students at all skill levels. Through UACTF, students will be provided
|
are opportunities for students at all skill levels. Through UACTF, students will be provided
|
||||||
with opportunities to collaborate, learn, and be exposed to a different way of thinking
|
with opportunities to collaborate, learn, and be exposed to a different way of thinking
|
||||||
about cyber security. This will include thinking about possible careers in the cyber
|
about cyber security. This will include thinking about possible careers in the cyber
|
||||||
security field.
|
security field. <br>
|
||||||
|
|
||||||
The material in this guide has been collected from several sources across the Internet.
|
The material in this guide has been collected from several sources across the Internet.
|
||||||
This guide will provide teams with a common starting point for preparing for UACTF and
|
This guide will provide teams with a common starting point for preparing for UACTF and
|
||||||
is not all inclusive of the challenges involved in UACTF. UACTF is not a hacking contest.
|
is not all inclusive of the challenges involved in UACTF. UACTF is not a hacking contest.
|
||||||
Think of UACTF as more of a puzzle solving challenge with a cyber security theme.
|
Think of UACTF as more of a puzzle solving challenge with a cyber security theme.
|
||||||
Below is a list of topics that might be seen during UACTF. This should not be considered
|
Below is a list of topics that might be seen during UACTF. This should not be considered
|
||||||
a comprehensive list of the types of challenges that will be seen during the competition.
|
a comprehensive list of the types of challenges that will be seen during the competition.
|
||||||
•
|
- Binary exploitation
|
||||||
•
|
- Code-breaking and decoding
|
||||||
•
|
- Cryptography
|
||||||
•
|
- Database security & SQL injection attacks
|
||||||
•
|
- Digital forensics
|
||||||
•
|
- Email analysis
|
||||||
•
|
- File analysis
|
||||||
•
|
- Network traffic analysis
|
||||||
•
|
- Programming
|
||||||
•
|
- Reverse engineering
|
||||||
•
|
- Social engineering
|
||||||
•
|
- Website security
|
||||||
Binary exploitation
|
|
||||||
Code-breaking and decoding
|
|
||||||
Cryptography
|
|
||||||
Database security & SQL injection attacks
|
|
||||||
Digital forensics
|
|
||||||
Email analysis
|
|
||||||
File analysis
|
|
||||||
Network traffic analysis
|
|
||||||
Programming
|
|
||||||
Reverse engineering
|
|
||||||
Social engineering
|
|
||||||
Website security
|
|
||||||
The following provides additional information and links for some of the challenge types
|
The following provides additional information and links for some of the challenge types
|
||||||
to assist the students in preparing for UACTF 2021.
|
to assist the students in preparing for UACTF 2021.
|
||||||
|
|||||||
Reference in New Issue
Block a user