Showing posts with label Interview. Show all posts
Showing posts with label Interview. Show all posts

2023/08/22

Unleashing Cybersecurity Skills: The World of Capture The Flag (CTF)

In the realm of cybersecurity, there's a game that isn't just about fun, but also about learning, challenges, and honing your hacking skills. It's called Capture The Flag (CTF). 

In this article, we'll delve into what CTF is, how it works, and why it's a crucial training ground for aspiring cybersecurity professionals.

1. Understanding Capture The Flag (CTF)

Capture The Flag (CTF) is a cybersecurity competition that simulates real-world hacking scenarios. Participants solve puzzles, decode messages, exploit vulnerabilities, and ultimately retrieve hidden "flags" to earn points. Flags are unique strings that prove a challenge's completion.

Image: A visual representation of a CTF flag being captured

2. Categories of CTF Challenges

CTF challenges are divided into distinct categories, mirroring the diverse aspects of cybersecurity:

Image: 6 common categories of Cyber Battle: Capture The Flag

2.1 Cryptography:

Cryptography challenges involve deciphering encoded messages, cracking codes, and understanding encryption techniques. You'll encounter various types of cyphers, substitution methods, and algorithms. Participants often need to apply analytical and mathematical thinking to break the encryption.

2.2 Web Security:

Web security challenges are focused on identifying and exploiting vulnerabilities present in web applications. These challenges mimic real-world scenarios where hackers attempt to bypass security mechanisms, execute code injection, or manipulate URLs to gain unauthorized access. 

2.3 Forensics:

Forensics challenges involve analyzing digital artefacts, logs, and files to extract hidden information. Participants may recover deleted files, decipher hidden messages in images, or reverse-engineer malware to understand its behaviour. These challenges test your attention to detail and analytical skills.

2.4 Reverse Engineering:

Reverse engineering challenges require participants to dissect compiled programs or binaries to understand their functionality. You'll explore executable files, disassemble code, and identify vulnerabilities. This category is particularly useful for understanding how malware operates.

2.5 Binary Exploitation:

Binary exploitation challenges involve exploiting vulnerabilities in compiled programs. Participants find ways to manipulate input data to trigger buffer overflows, code execution, or privilege escalation. This category focuses on understanding software vulnerabilities and crafting exploits.

2.6 Network Analysis:

Network analysis challenges focus on analyzing network traffic to uncover vulnerabilities or hidden information. You might examine packet captures, identify potential security flaws, and reconstruct network activities to understand their implications.

3. How Does CTF Work?

CTF participants engage in a variety of challenges:

3.1 Challenge Discovery

Participants select and tackle challenges based on their expertise. (You can refer to heading 2 "Categories of CTF Challenges").

3.2 Problem-Solving 

Image: Cyber Battle participants Source: itpss.com

Once participants choose a challenge category, they dive into solving challenges within that domain.

These challenges simulate real-world scenarios and require participants to:
  • Analyze Code: Examine source code, binaries, or other files for vulnerabilities and hidden information.
  • Reverse Engineer: Disassemble and understand the inner workings of compiled programs.
  • Decipher: Decode encrypted messages, cyphers, and codes using cryptography principles.
  • Examine Artifacts: Analyze digital artefacts like images, logs, or packet captures to extract relevant information.
Challenges require diverse skills, from coding to cryptography.

3.3 Flag Retrieval 

Solving a challenge leads to the discovery of a "flag," a unique piece of text that confirms successful completion. 

Flags are often in the format of alphanumeric strings. They're usually embedded within challenge files, hidden in code, or even transmitted within network packets.

3.4 Scoring

Image: Scoreboard sample of Cyber Battle: Capture The Flag, Source: haxf4rall.com 


For every successfully retrieved flag, participants earn points. The difficulty of the challenge determines the number of points awarded. 

Complex challenges with intricate solutions yield higher points. The participant or team with the most points wins the competition.

4. Importance of CTF Competitions

Capture The Flag (CTF) competitions are more than just challenges; they provide a rich learning experience and numerous benefits that contribute to personal and professional growth. 

Here's an in-depth exploration of the importance of CTF competitions:

4.1 Skill Enhancement and Practical Application:

Image: Participants of the Cyber Battle: Capture The Flag. Source: BruCert instagram

CTF challenges mirror real-world cybersecurity scenarios. By actively participating in challenges across various domains, participants enhance their technical skills and apply theoretical knowledge to practical situations. These experiences equip individuals with the ability to identify vulnerabilities, develop exploits, and defend against attacks.

4.2 Problem-Solving and Critical Thinking:


Image: Brainstorming session. Source: wework.com

Each CTF challenge presents a unique puzzle that requires analytical thinking, creativity, and problem-solving skills. Participants learn to dissect complex problems, break them down into manageable components, and develop systematic approaches to find solutions. This cultivates a mindset that's essential for tackling intricate cybersecurity challenges.

4.3 Exposure to Diverse Domains:

Image: Representation of diverse into cybersecurity domains. Source: evelynlim.com

CTF competitions cover a broad spectrum of cybersecurity domains, including cryptography, web security, forensics, and more. This exposure allows participants to explore different areas of interest and expertise. It encourages them to become well-rounded cybersecurity professionals with versatile skill sets.

4.4 Hands-On Learning and Active Participation:

Image: photo of 2016’s Cyber Battle: Capture The Flag competition, Source: itpss.com

Traditional learning methods are valuable, but CTF competitions offer a hands-on and immersive learning experience. Participants actively engage with challenges, experiment with tools, and observe immediate outcomes. This hands-on learning approach accelerates skill development and knowledge retention.

4.5 Teamwork and Collaboration:

Image: representing teamwork and collaboration. Source: quietrev.com

Many CTF competitions emphasize teamwork, fostering collaboration and communication among participants. Joining or forming teams allows individuals to share insights, strategies, and solutions. Collaborative efforts mirror real-world cybersecurity operations, where a diverse skill set is essential for success.

4.6 Competitive Spirit and Motivation:

CTF competitions add an element of competition that fuels motivation. Participants strive to earn points, solve challenges, and achieve a high rank on leaderboards. This competitive spirit drives individuals to continuously improve their skills, explore new techniques, and push their boundaries.

5. Preparing for CTF Success

Successfully participating in CTF competitions requires a combination of knowledge, skills, and strategies. Here's a detailed breakdown of how to prepare effectively:

5.1 Learn Key Concepts

  1. Cryptography: Familiarize yourself with encryption algorithms, decryption methods, and common cryptographic attacks.
  2. Web Security: Understand web vulnerabilities like SQL injection, cross-site scripting (XSS), and request forgery.
  3. Forensics: Learn techniques to analyze digital artefacts, recover deleted data, and reconstruct events.
  4. Reverse Engineering: Study assembly language and understand how to reverse-engineer compiled programs.
  5. Binary Exploitation: Learn about buffer overflows, format string vulnerabilities, and binary analysis.
  6. Network Analysis: Gain insights into network protocols, packet capture analysis, and network attacks.

5.2 Practice Regularly

  1. CTF Platforms: Explore CTF platforms like PicoCTF, Hack The BoxTryHackMe and PentesterLab Engage with challenges of varying difficulty levels to improve your skills.
  2. Wargames: Participate in cybersecurity wargames that simulate real-world scenarios and test your problem-solving abilities.
  3. Online Tutorials: Follow online tutorials that cover CTF-related topics and provide step-by-step guidance on solving challenges.

5.3 Joining Communities

  1. CTF Forums: Participate in CTF forums and communities to connect with like-minded individuals, ask questions, and share insights.
  2. Online Platforms: Join CTF-related Discord servers, Reddit communities, and social media groups to stay updated and interact with experts.

5.4 Team Collaboration

  1. Team Formation: Consider forming or joining a CTF team. Diverse skills and expertise within a team can enhance problem-solving and strategy development.
  2. Knowledge Sharing: Collaborate with team members to share insights, solutions, and tactics for tackling challenges effectively.

Stay Updated with Trends

  1. Cybersecurity News: Follow cybersecurity news, blogs, and websites to stay informed about the latest vulnerabilities, techniques, and trends.
  2. CTF Write-Ups: Read CTF write-ups and walkthroughs to understand different solution approaches and expand your toolkit.

Embrace the CTF Journey

Image: Top 3 teams of Cyber Battle: Capture The Flag 2016 Source: itpss.com

In the realm of cybersecurity, Capture The Flag (CTF) competitions emerge as a transformative journey that transcends traditional learning approaches. The path to becoming a proficient cybersecurity professional involves more than textbooks and theoretical knowledge—it's about immersing oneself in practical challenges, fostering problem-solving abilities, and embracing a community of like-minded enthusiasts.

CTF competitions provide a gateway to skill refinement, critical thinking, and continuous learning. As you navigate through various challenges—deciphering cryptographic puzzles, analyzing network traffic, dissecting binaries, and more—you embark on a journey of cybersecurity mastery. Every challenge solved, and every flag captured, contributes to your growth and expertise.

But it's not just about individual achievement. CTF thrives on collaboration and teamwork, reflecting the collaborative nature of cybersecurity operations in the real world. Forming teams, exchanging insights, and collectively unravelling complex challenges fosters camaraderie and mutual growth.

As you prepare, practice, and engage in CTF competitions, you're not just preparing for a challenge; you're preparing to contribute to a field that's critical to our digital landscape. Your efforts in understanding vulnerabilities, refining solutions, and fortifying defences are essential to safeguarding digital environments and information.

So, whether you're a newcomer intrigued by the world of cybersecurity or a seasoned professional seeking to expand your horizons, embrace CTF as a dynamic avenue of growth. With each challenge, you're not only capturing flags but also capturing opportunities to sharpen your skills, collaborate with peers, and contribute to the ever-evolving landscape of cybersecurity.

As you embark on this journey of mastering the art of CTF, remember that the thrill of solving challenges and capturing flags is matched only by the satisfaction of becoming a stronger and more adept cybersecurity practitioner. Let the flags you capture become badges of honour in your pursuit of excellence in the fascinating realm of cybersecurity.

Image: Reaching the summit. Source: zermatt.ch

May your journey through CTF competitions be exhilarating, enlightening, and transformative—a voyage that shapes not just your skills but also your perspective on the intricate dance between technology and security.

With flags in hand and knowledge at heart, venture forth on your path of cybersecurity discovery. The world of CTF awaits your exploration and contribution.

2011/10/27

Interview with Isyrah Fahmi Osman

Isyrah Fahmi Osman, is a final year undergraduate at Universiti Brunei Darussalam(UBD) majoring in Computer Science. The year 2010, was a good year for him. Having won the local and regional competition, he represented the whole Asia Pacific region in Present Around The World(PATW) held in London with his second year computer programming project, a 3x3x3 Rubik's Cube Solver Robot. The same robot also won the Brunei ICT Awards the same year, subsequently giving him the opportunity to represent Brunei at the Asia Pacific ICT Awards 2010 in Kuala Lumpur.

Having passion and interest in robotics, he has also participated in local and international robotic competitions namely: Robot Blast Competition(Techxpo 2010); ABU Robocon 2010 in Egypt; and ABU Robocon 2011 in Thailand. Although having won on so many occasions, Isyrah is still hungry for more. A laid-back person, he owes his success to his parents and family members, quoting that support, advice and blessings are important in one's life and success.

His Rubik's Robot can be viewed here.

2011/06/30

Interview @ iCentre Part 2


Salam Anak IT.
Image taken from BEDB
It's been a long time since Anak IT's previous interview "iCentre Part1" and today we continue with "iCentre Part2". I met Kumar from John Harith (iCentre incubatee) last Tuesday and asked if he would be available today for a short and informal interview on RFID (Radio Frequency Identification) and yes I managed to interview him this afternoon. iCentre is located in Kg. Anggerek Desa next to Knowledge Hub (K-Hub).
Just a little info of John Harith:
"John Harith Computer was formed during the Y2K era with the aim to streamline and achieve effective IT solutions to offer the corporate community flexible yet innovative solutions that address their needs for full visibility of their business operations. Our solutions are designed with the insight of future needs for expansion and to maximize business returns.
Most database solutions required a mixture of stored items to be treated in a single predefined data format. Cost of customizing work process and/or system upgrade is high and with limited flexibility. Difficulties with third parties systems integration"

2010/03/05

Interview @ iCentre Part1


Image taken from BEDB
Assalammm. Actually, we were suppose to interview Sir Rayner Tan from iCentre last week but "nada jodoh" due to public holiday and so today we were planning to "melanggar" (without informing) iCentre which is located in Kg. Anggerek Desa. Unfortunately, Sir Rayner is not in Brunei and will be coming back by next week.
Unexpectedly, we were happily entertained by Mohd Fadzli Hj Roslan, Facility Officer at iCentre. Even though it was not really an interview, we had a chance to have a "short talk" regarding certain things (which is still can be considered as short interview? hehe). Members who were representing Anak IT were:
  • Fadhullah
  • Zulfadly
Mohd Fadzli from iCentre with Fadhullah representing Anak IT
The short interview session:
Zulfadly : Actually, we only want to know apa saja hardware technology yang kana pakai disini and also di Brunei...
Fadzli : Talking about hardware ah, hardware ane sebenarnya very "large" here. Tapi I have to say, you must have specific thing that you want to develop. Lets say you want to do active control like security control, you buy macam... active control atue yang ada RFID (Radio Frequency Identification) verification. You can also do it as attendance. Then you can also do a tracking system (with RFID). But that is more into hardware. To create the system, you also need to create the software kan tue... to balance the outcome. If I want to say it now that I know barang ane, then bias tia. To be honest, we have someone who knows these things. Maybe he can talk more about the hardware... as well as the software lah.
Zulfadly Fadhullah : *angguk-angguk*
Fadzli : Tapi... Anyway, for now, I can share with you that the system that they use atue (system yang canggih yang bejual dikadai), is normally for "big shot" like government, urang kaya catue lah (pasal mahal harganya). Because normally urang Brunei masa ani alum mampu membali barang atue for personal use. Here, we don't want to talk about those big shots. We are trying to RE-create the system for public, meaning to say, WE, re-create the program. Sama pulang the program but we re-create using cheaper materials, hardware nya ni ah... as example we buy the motherboard for 80 dollars, then "tambah, tambah, tambah", and then we install the software (into the customised hardware). It is cheap so that it is available to public. Something like that. We RE-create. Bukannya kita invent baru... but if we invent, it starts from zero.
- Due to some Intellectual Properties matter involved in the short interview, Anak IT could not expose the further interview session -
Even if it was a short one, we achieved some knowledge that might be useful for us to implement it in any system creation projects in the near future. There are surely a lot of RFID reader inside the building. Since Zulfadly has his my own RFID card inside his wallet, he had like to test it out whether he could gain access from it or not by tapping his RFID card onto the RFID reader hehehe and ofcourse the result is predictable; "Invalid PIN number" or ampir-ampir catue la..
We would like to thank Mohd Fadzli Hj Roslan from iCentre for his companion and escort. Meet you again next week ;) and for Anak IT reader, wait for the upcoming "Interview @ iCentre Part2". Thank you for your support.
Reported by:
Zulfadly & Fadhullah
iCentre's Monthly Schedule : There will be a visit from Mahasiswa/Mahasiswi Institut Teknologi Brunei next two weeks.
Today's activity was "sponsored" by Air Suling
"Sudah biskita minum aing putih ari ani?"

2010/02/19

Interview - AITI


Today, Anak IT had arranged an interview with Authority for Info-communications Technology Industry of Brunei Darussalam or in short AITI. The interview was held at their place in Kg. Anggerek Desa. Members who representing Anak IT during the interview session were:
  • Wafiy
  • Zulfadly
For this interview, AITI (through Siti Zaraura Haji Mohammad) has elected Aedy Azmani Haji Azahari to entertain us. He is the manager of Public Relations under IT Industry Development Group. Anak IT representatives had selected "What is AITI in general?" as the interview's subject.
Aedy Azmani Haji Azahari with Anak IT Trademark
This is where the interview was conducted
The interview session:
Wafiy : Our topic for today is a bit general. We would like to know what AITI is all about
Aedy : If you play football, you have two sides kan. Let's say, you have DST FC and the other side is TelBru FC, we are the referee. We regulate telcom (telecommunication) companies. So, macam, in terms of brapa price bisdurang set, like easi kad kah or prima, kami set kan tue. They cannot go above, they cannot go below. So we regulate national spectrum and then... we control every ICT technology in Brunei so anything that goes to Brunei, has go to us to be approved and licensed. Sama macam every mobile yang masuk ke Brunei ani, has to go through us so we know frequency nya and at the same time we contact the mobile companies to verify frequency nya lurus kah inda supaya inda "clash". The main reason why we monitor the frequency is, so that.. dulu.. you guys remember kalau ada urang betelipun, skali ada suara urang third party? We want to eliminate that.
Zulfadly : Oh... so kira macam crossover kah ni?
Aedy : Yes crossover. We want to make the frequency atue clear (from any disturbance) for national security. Another thing is, since we control the equipment jua, segala walkie-talkie, mobile, satelite dish, parabola, basically anything that can be used to communicate la even PS3 punya joypad, we have to make sure ia punya reception ngam untuk playstation saja. You cannot use the joypad untuk ekon or anything like control computer dari bangunan atu kah *tunjuk bangunan sebalah*.. atu inda dapat tu.. same goes to other devices like parabola atue la aa sal ia ambil reception dari satellite.
Aedy : Ahh and then we monitor ICT companies jua. Since in Brunei ani we don't have trademark, maybe ada but inda kuat kan, I mean copyright atue la, anybody can simply cetak rompak. What we are doing is AABS (AITI Accredited Business Status). It is some sort of trademarking scheme. So siapa ada apply that through us, anything yg bisdia register (product) inda dapat urang copy tue. They have rights to protect them. If kedapatan kana copy, we can sue them (the one yang copying)
Zulfadly :  Aaaa so its like kalau Bruneian buat program or even system, we just register disini supaya copyrightED la tue..
Aedy : Yes. In a way, we protect them la.. That is in-line with our order jua, we help to promote ICT and at the same time we try to develop the ICT industry in Brunei Darussalam ani. We also try to facilitate macam exhibitions rah overseas for our local companies macam last year we joined Comnic ASEAN, the biggest ICT expo in South East Asia. So... apa lagi aa?
Zulfadly : If... Peranan AITI? Kira dalam penggunaan internet?
Aedy : Internet wise... We don't monitor tue... People who monitor internet is EGNC and ITPSS for security. Anyway, we have over 25 functions and duties. You want a copy? Sanang-sanang, minta email kamu la.
Wafiy : So, kalau aku ada device yang bebali dari Singapore macam wireless device, sekali aku kan makai untuk buat system, we must go here first right untuk mencek?
Aedy : Sini dulu tue. Minta and bawa specs nya (documented specifications), and then if approved, then balayar tah kamu then you bring the product in, liatkan saja and say "this has been approved by AITI" ja. Baru lapas. Kalau inda, the problem with urang kitani, bisdurang bali saja, then kana tahan marah and say "mana kami tau pasal AITI", datang kemari, we explained to them cana procedures nya and then barutah bisdurang tau pasal kami. Tapi, by right, urang kastam sepatutnya awal membaritahu bah, macam apa saja walkie-talkie kah apa, ada betampal disana bah kira they must go through us dulu. So basically, we have to implement that dari awal la.
Wafiy : Kami terpaksa bawa barang atue kesini la dulu?
Aedy : Sini dulu. Anything with receptions, frequency, mesti dari AITI minta kana approved especially communication equipment. Wireless mouse.. aa inda kalie.. cause atu inda jauh kan signalnya.
Aedy : We also have grant scheme. Lets say you have a baby company baru kan starting up and you need funding, you do a presentation to us, you prove to us that your product or service ani can make profit, so we give you money like allowance, capital to start up the business etc. and thats it, we monitor you.
Wafiy : Then after that kami bayar balik duit atue atau inda?
Aedy : No. Its yours. It is in-line with our order atue wa "to promote". Because as long as maju di Brunei ani, happy tah kami tue.
Zulfadly : Is it sama macam incubation kah?
Aedy : Awu. Sama tue.
"We licensed, we regulate. We promote, we protect." - Aedy Azmani @ AITI
It was around half an hour interview. We talked about a lot of stuff including IC3 training, Wi-Max as well as RFID. We would like to thank Aedy Azmani for his leisure time spent with us. For further information about AITI, kindly go to their website, http://www.aiti.gov.bn or simply click here. You may even visit their office to learn more about them. That is all for today and until the next interview, wabillahitaufiq walhidayah, Assalamu'alaikum wbt...
Reported by:
Zulfadly & Wafiy
Some galleries available inside the AITI building