<style> .slides img{background-color:grey!important} .slides img[title^='"']{filter:invert(100%)} hr, .slides [title^='*']{display:none} summary h1{display:inline;border-bottom:0!important} </style> ###### [資安入門課程 教學/](/@NCHUIT/infosec) # 好像有人拿picoCTF來水欸 2023/12/06 苜礿 muyue @S821 ---- ### 前言(aka 你可以不用看沒關係) 我在資安或說CTF領域其實沒有受過很正式的教學(X 每件事情基本上都是我自己查資料 / 摸出來的 甚至有各種活動我當初也都不清楚(so as now @@ 不知道這一個學期的社課這樣教下來大家有沒有吸收到 我也不知道自己教的好不好,畢竟本人原先高中是教網頁前端設計 Nah, just murmur Wish u'al can absorb and figure them out by urself Can ask me tho :) muyue 23.12.5 01:37 ---- ### Why picoCTF 1. easy to teach 2. constructed linux shell 3. Writeup for every challenge ---- ### 推薦自己拿去練習的picoCTF場次 - [Beginner picoMini 2022](https://play.picoctf.org/practice?originalEvent=69) - 原因:因為我破台了,不會就去查writeup ---- ### 感覺很適合新手的CTF場 - [Pointer Overview CTF](https://pointeroverflowctf.com/) - 最近滑[CTFtime](https://ctftime.org/)看到的,沒writeup ---- ### 關於chatGPT幫我備課 1. **Warmup:** - *Binary Exploitation:* [`buffer overflow 0`](https://play.picoctf.org/practice/challenge/3) - *Web Exploitation:* [`inspect me`](https://play.picoctf.org/practice/challenge/24) 2. **General Skills:** - *Cryptography:* [`caesar`](https://play.picoctf.org/practice/challenge/4) - *Forensics:* [`inspector general`](https://play.picoctf.org/practice/challenge/44) 3. **Forensics:** - [`Reading Between the Eyes`](https://play.picoctf.org/practice/challenge/56) (隱寫術) - [`Desrouleaux`](https://play.picoctf.org/practice/challenge/190) 4. **Binary Exploitation:** - [`buffer overflow 1`](https://play.picoctf.org/practice/challenge/9) - [`leak-me`](https://play.picoctf.org/practice/challenge/10) 5. **Web Exploitation:** - [`Client-side is Still Bad`](https://play.picoctf.org/practice/challenge/22) - [`Open-to-admin`](https://play.picoctf.org/practice/challenge/32) 6. **Reverse Engineering:** - [`vault-door-training`](https://play.picoctf.org/practice/challenge/71) - [`reeeeeeeeee`](https://play.picoctf.org/practice/challenge/74) 7. **Cryptography:** - [`rsa-pop-quiz`](https://play.picoctf.org/practice/challenge/29) - [`caesar-cipher-1`](https://play.picoctf.org/practice/challenge/14) 8. **Pwnable:** - [`got`](https://play.picoctf.org/practice/challenge/23) - [`practice-run-1`](https://play.picoctf.org/practice/challenge/15) 9. **Networking:** - [`what’s a net cat?`](https://play.picoctf.org/practice/challenge/21) - [`inspect me`](https://play.picoctf.org/practice/challenge/24) 10. **Programming:** - [`Magic Padding Oracle`](https://play.picoctf.org/practice/challenge/104) - [`hex2raw`](https://play.picoctf.org/practice/challenge/46)
{"title":"好像有人拿picoCTF來水欸","description":"https://play.picoctf.org/practice?originalEvent=69","contributors":"[{\"id\":\"96036b7f-aff1-4d9d-8e70-d6b1bec1655c\",\"add\":2771,\"del\":6}]"}
    599 views
   owned this note