BYU Cybersecurity Camps 2024 CTF
In this capture-the-flag (CTF) competition, you will learn about cybersecurity skills and techniques as you crack secret codes, find hidden clues, and test your computer knowledge.
Make sure to read the rules before you begin.
What is a CTF?
A CTF, or Capture the Flag, is a jeopardy-style cybersecurity competition. It consists of challenges of several categories, like cryptography, forensics, web development, reverse engineering, and more. Each challenge can be solved by completing a particular prompt, which will present you with a "flag", which you can submit to this website for points. A flag is a distinct string of text, typically surrounded by a descriptor and curly brackets, like byuctf{something here}
.
We design challenges suitable for every skill level in our CTF. Remember that when it comes to earning points, the more difficult the challenge, the more points it will reward. We may add more challenges to the CTF throughout the week (if we do, we'll send out a notification here on CTFd).
What are the categories?
Here's a brief description of each of the CTF categories:
- Crypto (Cryptography)- secret codes, ciphers, and encoding mechanisms
- Forensics (and Steganography)- finding hidden information
- OSINT (Open Source Intelligence Gathering)- finding information online that is freely available but sometimes hard to find
- Web (Website Exploitation)- understanding and exploiting websites
- Rev (Reverse Engineering)- reverse engineering programs and figuring out how they work
- Pwn (pronounced p + own and a.k.a. Binary Exploitation)- exploiting compiled binaries with attacks like buffer overflows
- Lock Picking- picking physical locks
- Misc (Miscellaneous)- anything that doesn't fit in the above categories