ctf-wiki.mahaloz.re Open in urlscan Pro
2606:4700:3037::ac43:817a  Public Scan

Submitted URL: http://ctf-wiki.mahaloz.re/
Effective URL: https://ctf-wiki.mahaloz.re/
Submission: On March 04 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: search

<form class="md-search__form" name="search">
  <input type="text" class="md-search__input" name="query" aria-label="Search" placeholder="Search" autocapitalize="off" autocorrect="off" autocomplete="off" spellcheck="false" data-md-component="search-query" data-md-state="active" required="">
  <label class="md-search__icon md-icon" for="__search">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M9.5 3A6.5 6.5 0 0 1 16 9.5c0 1.61-.59 3.09-1.56 4.23l.27.27h.79l5 5-1.5 1.5-5-5v-.79l-.27-.27A6.516 6.516 0 0 1 9.5 16 6.5 6.5 0 0 1 3 9.5 6.5 6.5 0 0 1 9.5 3m0 2C7 5 5 7 5 9.5S7 14 9.5 14 14 12 14 9.5 12 5 9.5 5z"></path>
    </svg>
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M20 11v2H8l5.5 5.5-1.42 1.42L4.16 12l7.92-7.92L13.5 5.5 8 11h12z"></path>
    </svg>
  </label>
  <button type="reset" class="md-search__icon md-icon" aria-label="Clear" tabindex="-1">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41z"></path>
    </svg>
  </button>
</form>

<form id="gitalk-form" onsubmit="return false;">
  <div id="gitalk-container">
    <div class="gt-container">
      <div class="gt-meta"><span class="gt-counts"><a class="gt-link gt-link-counts" href="https://github.com/ctf-wiki/comment/issues/2" target="_blank" rel="noopener noreferrer">1</a> comment</span>
        <div class="gt-user">
          <div class="gt-user-inner"><span class="gt-user-name">Anonymous</span><span class="gt-ico gt-ico-arrdown"><span class="gt-svg"><svg viewBox="0 0 1024 1024" xmlns="http://www.w3.org/2000/svg" p-id="1619">
                  <path
                    d="M511.872 676.8c-0.003 0-0.006 0-0.008 0-9.137 0-17.379-3.829-23.21-9.97l-251.277-265.614c-5.415-5.72-8.743-13.464-8.744-21.984 0-17.678 14.33-32.008 32.008-32.008 9.157 0 17.416 3.845 23.25 10.009l228.045 241.103 228.224-241.088c5.855-6.165 14.113-10.001 23.266-10.001 8.516 0 16.256 3.32 21.998 8.736 12.784 12.145 13.36 32.434 1.264 45.233l-251.52 265.6c-5.844 6.155-14.086 9.984-23.223 9.984-0.025 0-0.051 0-0.076 0z"
                    p-id="1620"></path>
                </svg></span></span></div>
        </div>
      </div>
      <div class="gt-header"><a class="gt-avatar-github"><span class="gt-ico gt-ico-github"><span class="gt-svg"><svg viewBox="0 0 1024 1024" version="1.1" xmlns="http://www.w3.org/2000/svg">
  <path d="M64 524C64 719.602 189.356 885.926 364.113 947.017 387.65799 953 384 936.115 384 924.767L384 847.107C248.118 863.007 242.674 773.052 233.5 758.001 215 726.501 171.5 718.501 184.5 703.501 215.5 687.501 247 707.501 283.5 761.501 309.956 800.642 361.366 794.075 387.658 787.497 393.403 763.997 405.637 743.042 422.353 726.638 281.774 701.609 223 615.67 223 513.5 223 464.053 239.322 418.406 271.465 381.627 251.142 320.928 273.421 269.19 276.337 261.415 334.458 256.131 394.888 302.993 399.549 306.685 432.663 297.835 470.341 293 512.5 293 554.924 293 592.81 297.896 626.075 306.853 637.426 298.219 693.46 258.054 747.5 262.966 750.382 270.652 772.185 321.292 753.058 381.083 785.516 417.956 802 463.809 802 513.5 802 615.874 742.99 701.953 601.803 726.786 625.381 750.003 640 782.295 640 818.008L640 930.653C640.752 939.626 640 948.664978 655.086 948.665 832.344 888.962 960 721.389 960 524 960 276.576 759.424 76 512 76 264.577 76 64 276.576 64 524Z"></path>
</svg>
</span></span></a>
        <div class="gt-header-comment"><textarea class="gt-header-textarea " placeholder="Leave a comment" style="overflow: hidden; overflow-wrap: break-word; resize: none; height: 72px;"></textarea>
          <div class="gt-header-preview markdown-body hide"></div>
          <div class="gt-header-controls"><a class="gt-header-controls-tip" href="https://guides.github.com/features/mastering-markdown/" target="_blank" rel="noopener noreferrer"><span class="gt-ico gt-ico-tip"><span class="gt-svg"><svg viewBox="0 0 1024 1024" version="1.1" xmlns="http://www.w3.org/2000/svg">
  <path d="M512 366.949535c-16.065554 0-29.982212 13.405016-29.982212 29.879884l0 359.070251c0 16.167882 13.405016 29.879884 29.982212 29.879884 15.963226 0 29.879884-13.405016 29.879884-29.879884L541.879884 396.829419C541.879884 380.763865 528.474868 366.949535 512 366.949535L512 366.949535z" p-id="3083"></path>
  <path d="M482.017788 287.645048c0-7.776956 3.274508-15.553912 8.80024-21.181973 5.525732-5.525732 13.302688-8.80024 21.181973-8.80024 7.776956 0 15.553912 3.274508 21.079644 8.80024 5.525732 5.62806 8.80024 13.405016 8.80024 21.181973 0 7.776956-3.274508 15.656241-8.80024 21.181973-5.525732 5.525732-13.405016 8.697911-21.079644 8.697911-7.879285 0-15.656241-3.274508-21.181973-8.697911C485.292295 303.301289 482.017788 295.524333 482.017788 287.645048L482.017788 287.645048z" p-id="3084"></path>
  <path d="M512 946.844409c-239.8577 0-434.895573-195.037873-434.895573-434.895573 0-239.8577 195.037873-434.895573 434.895573-434.895573 239.755371 0 434.895573 195.037873 434.895573 434.895573C946.895573 751.806535 751.755371 946.844409 512 946.844409zM512 126.17088c-212.740682 0-385.880284 173.037274-385.880284 385.777955 0 212.740682 173.037274 385.777955 385.880284 385.777955 212.740682 0 385.777955-173.037274 385.777955-385.777955C897.777955 299.208154 724.740682 126.17088 512 126.17088z" p-id="3085"></path>
</svg>
</span><span class="gt-ico-text">Markdown is supported</span></span></a><button class="gt-btn gt-btn-preview"><span class="gt-btn-text">Preview</span></button><button class="gt-btn gt-btn-login"><span class="gt-btn-text">Login with
                GitHub</span></button></div>
        </div>
      </div>
      <div class="gt-comments">
        <div style="position: relative;">
          <div class="gt-comment gt-comment-admin" style="transform-origin: center top;">
            <div class="gt-avatar gt-comment-avatar"><img src="https://avatars.githubusercontent.com/u/13835420?v=4" alt="@40huo"></div>
            <div class="gt-comment-content">
              <div class="gt-comment-header">
                <div class="gt-comment-block-1"></div><a class="gt-comment-username" href="https://github.com/40huo">40huo</a><span class="gt-comment-text">commented</span><span class="gt-comment-date">over 5 years ago</span><a class="gt-comment-like" title="Like"><span class="gt-ico gt-ico-heart"><span class="gt-svg"><svg viewBox="0 0 1024 1024" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
  <path d="M527.061333 166.528A277.333333 277.333333 0 0 1 1000.618667 362.666667a277.333333 277.333333 0 0 1-81.28 196.138666l-377.173334 377.173334a42.666667 42.666667 0 0 1-60.330666 0l-377.173334-377.173334a277.376 277.376 0 0 1 392.277334-392.277333l15.061333 15.061333 15.061333-15.061333z m286.72 377.173333l45.226667-45.226666a192 192 0 0 0-135.808-327.893334 192 192 0 0 0-135.808 56.32l-45.226667 45.226667a42.666667 42.666667 0 0 1-60.330666 0l-45.226667-45.226667a192.042667 192.042667 0 0 0-271.616 271.573334L512 845.482667l301.781333-301.781334z"></path>
</svg>
</span></span></a><a class="gt-comment-reply" title="Reply"><span class="gt-ico gt-ico-reply"><span class="gt-svg"><svg viewBox="0 0 1332 1024" version="1.1" xmlns="http://www.w3.org/2000/svg">
  <path d="M529.066665 273.066666 529.066665 0 51.2 477.866666 529.066665 955.733335 529.066665 675.84C870.4 675.84 1109.333335 785.066665 1280 1024 1211.733335 682.666665 1006.933335 341.333334 529.066665 273.066666"></path>
</svg>
</span></span></a>
              </div>
              <div class="gt-comment-body markdown-body">
                <p dir="auto">测试123</p>
              </div>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

Skip to content

CTF Wiki EN
Getting Started
Initializing search
mahaloz/ctf-wiki-en
 * 64
 * 16

 * Introduction
 * Misc
 * Crypto
 * Web
 * Assembly
 * Executable
 * Reverse Engineering
 * Pwn
 * Android
 * ICS

CTF Wiki EN
mahaloz/ctf-wiki-en
 * 64
 * 16

 * Introduction
   Introduction
    * Getting Started Getting Started
      Table of contents
       * How to build?
       * How to practice?
   
    * CTF History
    * CTF Competition Types
    * CTF Competition Topics
    * Attack and Defense Experience Summary
    * Learning Resources

 * Misc
   Misc
    * Miscellaneous Introduction
    * Information Gathering Method
    * Encoding Analysis
      Encoding Analysis
       * Encoding Used in Communication
       * Encoding Used in Computing
       * Encoding Used in the Real World
   
    * Forensic and Steganography Prerequisite
    * Image Analysis
      Image Analysis
       * Introduction to Image Analysis
       * PNG
       * JPG
       * GIF
   
    * Audio Steganography
    * Traffic Packet Analysis
      Traffic Packet Analysis
       * Introduction to Traffic Packet Analysis
       * PCAP File Repairing
       * Protocol Analysis
         Protocol Analysis
          * Overview of Protocol Analysis
          * Wireshark
          * HTTP
          * HTTPS
          * FTP
          * DNS
          * WIFI
          * USB
      
       * Data Extraction
   
    * Compressed Package Analysis
      Compressed Package Analysis
       * ZIP Format
       * RAR Format
   
    * Disk and Memory Analysis
      Disk and Memory Analysis
       * Introduction

 * Crypto
   Crypto
    * Introduction to Cryptography
    * Basic Mathematics
      Basic Mathematics
       * Introduction
   
    * Classical Cipher
      Classical Cipher
       * Introduction to Classical Cryptography
       * Single table Substitution Cipher
       * Multi-table Substitution Cipher
       * Other Types of Cipher
       * Summary
   
    * Stream Cipher
      Stream Cipher
       * Introduction
       * Pseudo Random Number Generator
         Pseudo Random Number Generator
          * Introduction
          * Cryptographic Security Pseudo-random Number Generator
          * Challenge Examples
      
       * Linear Congruence Generator
         Linear Congruence Generator
          * Introduction
          * Example
      
       * Feedback Shift Register
         Feedback Shift Register
          * Introduction
          * Linear Feedback Shift Register
          * Nonlinear Feedback Shift Register
      
       * Special Stream Cipher
         Special Stream Cipher
          * RC4
   
    * Block Cipher
      Block Cipher
       * Introduction to Block Cipher
       * ARX
       * DES
       * IDEA
       * AES
       * Simon and Speck
       * Group Mode
         Group Mode
          * Introduction
          * Padding Methods
          * ECB
          * CBC
          * PCBC
          * CFB
          * OFB
          * CTR
          * Padding Oracle Attack
   
    * Asymmetric Cryptography
      Asymmetric Cryptography
       * Introduction to Asymmetric Cryptography
       * RSA
         RSA
          * RSA Introduction
          * Modulo-related Attacks
          * Public Key Index Related Attacks
          * Private Key d Related Attacks
          * Coppersmith Related Attacks
          * Chosen Plain Cipher Attack
          * Side Channel Attack
          * Bleichenbacher Attack
          * Challenge Examples
      
       * Knapsack Cipher
       * Discrete Log Correlation
         Discrete Log Correlation
          * Discrete Logarithm
          * Elgamal
          * ECC
      
       * Lattice-based Cryptography
         Lattice-based Cryptography
          * Lattice Overview
          * Introduction to Lattices
          * Lattice-based Algorithm
          * CVP
   
    * Hash Function
      Hash Function
       * Introduction to the Hash Function
       * MD5
       * SHA1
       * FNV
       * Hash Attack
       * Challenge Examples
   
    * Digital Signature
      Digital Signature
       * Introduction to Digital Signatures
       * RSA Digital Signature
       * ElGamal Digital Signature
       * DSA Digital Signature
   
    * Summary of Attack Techniques
      Summary of Attack Techniques
       * Introduction
       * Man in the Middle Attack
       * Bit attack
   
    * Certificate Format

 * Web
   Web
    * Introduction to Web Applications
    * SQL Injection
    * XSS Cross-Site Scripting
    * CSRF Cross-Site Request Forgery
    * SSRF Server Request Forgery
    * PHP Code Auditing

 * Assembly
   Assembly
    * x86_x64
    * mips
    * arm

 * Executable
   Executable
    * ELF file
      ELF file
       * ELF File Basic Structure
       * Program Loading
       * Program Link
       * Program Execution Flow
   
    * PE file
      PE file
       * PE File Basic Structure
       * PE Import Table
       * PE Export Table
       * PE Relocation Table

 * Reverse Engineering
   Reverse Engineering
    * Reverse Overview
      Reverse Overview
       * Software Reverse Engineering Introduction
       * Common Encryption Algorithms and Code Recognition
       * Labyrinth Problem
       * Virtual Machine Command Analysis
       * Unicorn Engine Introduction
   
    * Linux Reverse
      Linux Reverse
       * Linux Reverse Technology
         Linux Reverse Technology
          * LD_PRELOAD
          * Incorrect Disassembly Fix
          * Detecting Breakpoints Bypassing
          * Detecting Debugging Bypassing
   
    * Windows Reverse
      Windows Reverse
       * Shelling Technique
         Shelling Technique
          * Introduction to the Protective case
          * Single Step Tracking Method
          * ESP Law
          * One Step to the OEP Method
          * Memory Mirroring Method
          * Last Exception Method
          * SFX Method
          * DUMP and IAT Reconstruction
          * Manually Find the IAT and Rebuild It Using ImportREC
          * DLL File Unpacking
      
       * Anti-debugging Technique
         Anti-debugging Technique
          * NtGlobalFlag
          * Heap Flags
          * The Heap
          * Interrupt 3
          * IsDebuggerPresent
          * CheckRemoteDebuggerPresent
          * NtQueryInformationProcess
          * ZwSetInformationThread
          * Flower command
          * Anti-debug Technical Example

 * Pwn
   Pwn
    * Pwn Overview
      Pwn Overview
       * Readme
   
    * Linux Pwn
      Linux Pwn
       * Security Protection Mechanism
         Security Protection Mechanism
          * Canary
      
       * Stack Overflow
         Stack Overflow
          * Stack Introduction
          * Stack Overflow Principle
          * Basic ROP
          * Intermediate ROP
          * Advanced ROP
          * ROP Tricks
      
       * Format String Vulnerability
         Format String Vulnerability
          * Format String Vulnerability Principle
          * Format String Exploit
          * Format String Vulnerability Example
          * Format String Vulnerability Detection
      
       * Glibc Heap Related
         Glibc Heap Related
          * Introduction to Heap
          * Heap Overview
          * Heap Related Data Structure
          * In-depth Explanation of Ptmalloc2
            In-depth Explanation of Ptmalloc2
             * Implementation
             * Basic Functions in the heap implementation
             * Heap Initialization
             * Allocate Heap Memory
             * Free Heap Memory
             * Tcache
             * malloc_state
             * Other
         
          * Heap Overflow
          * Heap-based Off-By-One
          * Chunk Extend/Overlapping
          * Unlink
          * Use After Free
          * Fastbin Attack
          * Unsorted Bin Attack
          * Large Bin Attack
          * Tcache Attack
          * House of Einherjar
          * House of Force
          * House of Lore
          * House of Orange
          * House of Rabbit
          * House of Roman
      
       * IO_FILE Related
         IO_FILE Related
          * FILE Structure Description
          * Forged Vtable to Hijack Control Flow
          * FSOP
          * Use of IO_FILE Under Glibc 2.24
      
       * Race Condition
         Race Condition
          * Race Condition Introduction
          * Example
      
       * Integer Overflow
         Integer Overflow
          * Introduction to The Principle of Integer Overflow
      
       * Sandbox Escape
         Sandbox Escape
          * Python Sandbox Escape
      
       * Linux Kernel
         Linux Kernel
          * Environment Setup
          * Basics
          * Kernel-UAF
          * Kernel-ROP
          * ret2usr
          * bypass-smep
          * Double Fetch
      
       * arm-pwn
         arm-pwn
          * Environment Setup
          * arm-rop
      
       * Summary
         Summary
          * Address Leaking
          * Hijack Control Flow
          * Get Shell
   
    * Windows Pwn
      Windows Pwn
       * Overview
       * Stack Overflow
         Stack Overflow
          * Stack Introduction
          * Stack Overflow Basics
          * shellcode-in-stack

 * Android
   Android
    * Android Development Basics
    * Android Application Operating Mechanism Brief
      Android Application Operating Mechanism Brief
       * Basics
       * The Operating Mechanism of the Java Layer in Android
         The Operating Mechanism of the Java Layer in Android
          * Andriod Native
          * Smali Introduction
          * Dex and ODEX
            Dex and ODEX
             * DEX
             * ODEX
      
       * Android Native Layer Introduction
         Android Native Layer Introduction
          * Android Shared Object
      
       * Android Reverse Basic Introduction
         Android Reverse Basic Introduction
          * Brief Overview
          * Android Key Part Location
          * Android Simple Static Analysis
            Android Simple Static Analysis
             * Android Java Layer Static Analysis
             * Android Native Layer Static Analysis
             * Android Static Analysis Hybrid Example
         
          * Android Simple Dynamic Analysis
            Android Simple Dynamic Analysis
             * Dynamic Debugging
             * Android Dynamic Debugging SO

 * ICS
   ICS
    * ICS_CTF Contest
    * ICS_CTF Discovery
    * ICS_CTF Exploit
    * ICS_CTF Learning Resources

Table of contents
 * How to build?
 * How to practice?


GETTING STARTED

Welcome to the CTF Wiki.

CTF (Capture The Flag) is originated in the 1996 DEFCON Global Hacking
Conference, a competitive game among cybersecurity enthusiasts.

The CTF competition covers a wide range of fields and has a complex content. At
the same time, the development of security technology is getting faster and
faster, and the difficulty of CTF is getting higher and higher, the threshold
for beginners is getting higher and higher. Most of the online information is
scattered and trivial. Beginners often don't know how to systematically learn
the knowledge of CTF related fields, often taking a lot of time and suffering.

In order to make the CTF players life of entering this field easier, in October
2016, CTF Wiki had the first commit on Github. As content continues to improve,
the CTF Wiki has been loved by more and more security enthusiasts, and there are
also a lot of friends who have never met participating in this project.

As a free site, with the recent years' CTF challenges, CTF Wiki introduces the
knowledge and techniques in all directions of CTF to make it easier for
beginners to learn how to getting started at playing CTF.

At present, CTF Wiki mainly contains the basic knowledge of CTF in all major
directions, and is working hard to improve the following contents.

 * Advanced knowledge in the CTF competition
 * Quality topics in the CTF competition

For more information on the above, see the [Projects]
(https://github.com/ctf-wiki/ctf-wiki/projects) of the CTF Wiki for a detailed
list of what is being done and what to do.

Of course, the CTF Wiki is based on CTF, but it is not limited to CTF. In the
future, CTF Wiki will

 * Introducing tools in security research area
 * More integration with security area

In addition, given the following two points

 * Technology should be shared in an open manner.
 * Security offensive and defensive technologies are always up to date, and old
   technologies may fail at any time in the face of new technologies.

CTF Wiki will never publish books.

Finally, the CTF Wiki originates from the community, as an independent
organization, advocates freedom of knowledge, will never be commercialized in
the future, and will always remain independent and freedom**.


HOW TO BUILD?¶

This document is currently deployed at [https://ctf-wiki.github.io/ctf-wiki/]
(https://ctf-wiki.github) using mkdocs .io/ctf-wiki/). Of course, it can also be
deployed locally, as follows:

# 1. clone

git clone git@github.com: ctf-wiki / ctf-wiki.git
# 2. requirements

pip install -r requirements.txt

# generate static file in site/

mkdocs build

# deploy at http://127.0.0.1:8000

mkdocs serve


mkdocs Locally deployed websites are dynamically updated, i.e. when you modify
and save the md file, refreshing the page and the contents will be dynamically
updated.

Just want to browse locally, don't want to modify the document? Try Docker!

docker run -d --name=ctf-wiki -p 4100:80 ctfwiki/ctf-wiki




You can then access the CTF Wiki by visiting [http://localhost:4100/]
(http://localhost:4100/) in your browser.


HOW TO PRACTICE?¶

First, you can learn some basic security knowledge by reading online.

Second, the CTF Wiki has two accompany projects.

 * The challenges mentioned in the CTF Wiki are in the [ctf-challenges]
   (https://github.com/ctf-wiki/ctf-challenges) repository, so look for them
   according to the corresponding category.
 * Note: There are still some challenges that are currently being migrated. . .
   (misc, web)
 * The tools involved in the CTF Wiki are constantly being added to the
   ctf-tools repository.

--------------------------------------------------------------------------------

> 本页面的全部内容在 CC BY-NC-SA 4.0 协议之条款下提供,附加条款亦可能应用。


COMMENTS

1 comment
Anonymous
Markdown is supportedPreviewLogin with GitHub

40huocommentedover 5 years ago

测试123

Next CTF History

Copyright © 2021 mahaloz
Made with Material for MkDocs