ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Flag4 CTF

Journal: International Journal of Trend in Scientific Research and Development (Vol.4, No. 6)

Publication Date:

Authors : ;

Page : 1643-1644

Keywords : CTF; vulnerability; flag; security; capture the flag; remote desktop service; tftpd; tftpd32/64; mssql server;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In today's world a place where there is a large scope for Security, many people are busy building applications, web pages and many more but no one actually concentrates on security aspect of it. As the technology increases, the flaws in the security system also increases. The CTF machine is one such solution for this problem, where the person who is learning hacking can use these kind of machines and learn security in a much deeper way. Capture The Flag are games where the hackers have to solve puzzles and find bugs so that they can get through system flaws and find flag, which is the main goal. Typical CTFs offer many challenges, most commonly the hackers have to exploit some kind of service so that you can get remote access to the server and read the content of the file that contains a special string called “flag”, which is a proof that he she has hacked the system. Dr. C. Umarani | R P Shruti "Flag4 CTF" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35734.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35734/flag4-ctf/dr-c-umarani

Last modified: 2020-11-23 19:51:48