{"title":"捕获标志(CTF)工具的实现","authors":"Mohammad Nadeem Uddin, Sparsh Mishra, Ankur Das, Tanmay Rastogi, Anshul Verma, Piya Kothari","doi":"10.1109/ICTAI53825.2021.9673160","DOIUrl":null,"url":null,"abstract":"Cyber security competitions are gaining much attention as an outstanding method of computer security education. It is important to find out better and new ways to get involved students and freshers in computer security development challenges. This task collected and analyzed the solutions to 3600 issues captured through CTF from around 150 competitions were performed and hosted in last 2 years. This activity has identified safety issues highly relevant to the industry and academics. It is listed as safety tools and techniques used so much for the players. Here we have described a bunch of exercises as a toolkit for new comers and freshers to try it out in the system security threats identification and resolution.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Implementation of Capture the Flag (CTF) Tool\",\"authors\":\"Mohammad Nadeem Uddin, Sparsh Mishra, Ankur Das, Tanmay Rastogi, Anshul Verma, Piya Kothari\",\"doi\":\"10.1109/ICTAI53825.2021.9673160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber security competitions are gaining much attention as an outstanding method of computer security education. It is important to find out better and new ways to get involved students and freshers in computer security development challenges. This task collected and analyzed the solutions to 3600 issues captured through CTF from around 150 competitions were performed and hosted in last 2 years. This activity has identified safety issues highly relevant to the industry and academics. It is listed as safety tools and techniques used so much for the players. Here we have described a bunch of exercises as a toolkit for new comers and freshers to try it out in the system security threats identification and resolution.\",\"PeriodicalId\":278263,\"journal\":{\"name\":\"2021 International Conference on Technological Advancements and Innovations (ICTAI)\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Technological Advancements and Innovations (ICTAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTAI53825.2021.9673160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTAI53825.2021.9673160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber security competitions are gaining much attention as an outstanding method of computer security education. It is important to find out better and new ways to get involved students and freshers in computer security development challenges. This task collected and analyzed the solutions to 3600 issues captured through CTF from around 150 competitions were performed and hosted in last 2 years. This activity has identified safety issues highly relevant to the industry and academics. It is listed as safety tools and techniques used so much for the players. Here we have described a bunch of exercises as a toolkit for new comers and freshers to try it out in the system security threats identification and resolution.