Abstract

This will mostly cover basic methodology of how to approach any CTF, and then get cracking on it. This can be very briefly, broken down into
1. Finding the address.
2. Discovering the open services.
3. Exploiting the service to gain an entry point.
4. Privilege Escalation.
5. Capturing the Flag.

Speaker

Mayank

Working as a Security Analyst at Network Intelligence India. A continuous learner.

Timing

Starts at Saturday August 27 2016, 10:00 AM. The sessions runs for about 3 hours.

Resources