<style>
.slides img{background-color:grey!important}
.slides img[title^='"']{filter:invert(100%)}
hr, .slides [title^='*']{display:none}
summary h1{display:inline;border-bottom:0!important}
</style>
###### [資安入門課程 教學/](/@NCHUIT/infosec)
# 好像有人拿picoCTF來水欸
2023/12/06 苜礿 muyue
@S821
----
### 前言(aka 你可以不用看沒關係)
我在資安或說CTF領域其實沒有受過很正式的教學(X
每件事情基本上都是我自己查資料 / 摸出來的
甚至有各種活動我當初也都不清楚(so as now @@
不知道這一個學期的社課這樣教下來大家有沒有吸收到
我也不知道自己教的好不好,畢竟本人原先高中是教網頁前端設計
Nah, just murmur
Wish u'al can absorb and figure them out by urself
Can ask me tho :)
muyue 23.12.5 01:37
----
### Why picoCTF
1. easy to teach
2. constructed linux shell
3. Writeup for every challenge
----
### 推薦自己拿去練習的picoCTF場次
- [Beginner picoMini 2022](https://play.picoctf.org/practice?originalEvent=69)
- 原因:因為我破台了,不會就去查writeup
----
### 感覺很適合新手的CTF場
- [Pointer Overview CTF](https://pointeroverflowctf.com/)
- 最近滑[CTFtime](https://ctftime.org/)看到的,沒writeup
----
### 關於chatGPT幫我備課
1. **Warmup:**
- *Binary Exploitation:* [`buffer overflow 0`](https://play.picoctf.org/practice/challenge/3)
- *Web Exploitation:* [`inspect me`](https://play.picoctf.org/practice/challenge/24)
2. **General Skills:**
- *Cryptography:* [`caesar`](https://play.picoctf.org/practice/challenge/4)
- *Forensics:* [`inspector general`](https://play.picoctf.org/practice/challenge/44)
3. **Forensics:**
- [`Reading Between the Eyes`](https://play.picoctf.org/practice/challenge/56) (隱寫術)
- [`Desrouleaux`](https://play.picoctf.org/practice/challenge/190)
4. **Binary Exploitation:**
- [`buffer overflow 1`](https://play.picoctf.org/practice/challenge/9)
- [`leak-me`](https://play.picoctf.org/practice/challenge/10)
5. **Web Exploitation:**
- [`Client-side is Still Bad`](https://play.picoctf.org/practice/challenge/22)
- [`Open-to-admin`](https://play.picoctf.org/practice/challenge/32)
6. **Reverse Engineering:**
- [`vault-door-training`](https://play.picoctf.org/practice/challenge/71)
- [`reeeeeeeeee`](https://play.picoctf.org/practice/challenge/74)
7. **Cryptography:**
- [`rsa-pop-quiz`](https://play.picoctf.org/practice/challenge/29)
- [`caesar-cipher-1`](https://play.picoctf.org/practice/challenge/14)
8. **Pwnable:**
- [`got`](https://play.picoctf.org/practice/challenge/23)
- [`practice-run-1`](https://play.picoctf.org/practice/challenge/15)
9. **Networking:**
- [`what’s a net cat?`](https://play.picoctf.org/practice/challenge/21)
- [`inspect me`](https://play.picoctf.org/practice/challenge/24)
10. **Programming:**
- [`Magic Padding Oracle`](https://play.picoctf.org/practice/challenge/104)
- [`hex2raw`](https://play.picoctf.org/practice/challenge/46)
{"title":"好像有人拿picoCTF來水欸","description":"https://play.picoctf.org/practice?originalEvent=69","contributors":"[{\"id\":\"96036b7f-aff1-4d9d-8e70-d6b1bec1655c\",\"add\":2771,\"del\":6}]"}