Flag4 CTF
Journal: International Journal of Trend in Scientific Research and Development (Vol.4, No. 6)Publication Date: 2020-10-08
Authors : C. Umarani R P Shruti;
Page : 1643-1644
Keywords : CTF; vulnerability; flag; security; capture the flag; remote desktop service; tftpd; tftpd32/64; mssql server;
Abstract
In today's world a place where there is a large scope for Security, many people are busy building applications, web pages and many more but no one actually concentrates on security aspect of it. As the technology increases, the flaws in the security system also increases. The CTF machine is one such solution for this problem, where the person who is learning hacking can use these kind of machines and learn security in a much deeper way. Capture The Flag are games where the hackers have to solve puzzles and find bugs so that they can get through system flaws and find flag, which is the main goal. Typical CTFs offer many challenges, most commonly the hackers have to exploit some kind of service so that you can get remote access to the server and read the content of the file that contains a special string called “flag”, which is a proof that he she has hacked the system. Dr. C. Umarani | R P Shruti "Flag4 CTF" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35734.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35734/flag4-ctf/dr-c-umarani
Other Latest Articles
- Factors Leading to Major Casting Defects and their Influence on Productivity of Foundry
- Review Paper on Predicting Network Attack Patterns in SDN using ML
- Food Safety Practices among Street Food Vendors in Diplo, Sindh, Pakistan
- Problems of Elementary Education in Valsad District of Gujarat
- Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption
Last modified: 2020-11-23 19:51:48