Capture the flag

Results: 35



#Item
1Education / Educational psychology / Human behavior / Educational assessment / Flag / Capture the flag / Exercise / CTFS / VM / Formative assessment / Educational technology / Test

An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education Tom Chothia School of Computer Science University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
2

Google Capture the Flag 2017 solution write-up – “JohnnyBoy” Author: Kirils Solovjovs Team: possiblesecurity.com Challenge: Reversing / Easy / “JohnnyBoy” This looks retro but somewhat futuristic! I always lose

Add to Reading List

Source URL: possiblesecurity.com

Language: English
    3

    The 2005 International Capture The Flag Hacking Competition Fall 2005 Giovanni Vigna University of California Santa Barbara

    Add to Reading List

    Source URL: ictf.cs.ucsb.edu

    - Date: 2005-11-17 12:40:38
      4

      Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise* Joseph Werther, Michael Zhivich, Timothy Leek, Nickolai Zeldovich Cyber Security Experimentation And TestAugust 2011

      Add to Reading List

      Source URL: static.usenix.org

      - Date: 2011-08-22 17:57:26
        5Cryptography / Passphrase / Obfuscation / Computer security / Crypt

        Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Peter Chapman

        Add to Reading List

        Source URL: jburket.com

        Language: English - Date: 2015-08-11 16:10:08
        6Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

        Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

        Add to Reading List

        Source URL: static.usenix.org

        Language: English - Date: 2011-07-08 13:42:25
        7Vexillology / Flags / Capture the flag / Computer network security / Reduction

        Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Carnegie Mellon University Peter Chapman

        Add to Reading List

        Source URL: jburket.com

        Language: English - Date: 2015-08-11 15:26:34
        8

        A Curriculum Guide for Evil Spy School By Stuart Gibbs About the Book During a spy school game of Capture the Flag, twelve-year-old Ben Ripley somehow accidentally shoots a live mortar into the principal’s office—and

        Add to Reading List

        Source URL: d28hgpri8am2if.cloudfront.net

        Language: English - Date: 2014-10-26 07:30:32
          9

          「特設実習(セキュリティ実践Ⅰ)及び特設実習(セキュリティ実践Ⅱ)」実践演習モジュール(SecCap I-04:技術系) 「Capture The Flag(CTF)入門と実践演習」 詳細 ■担当教員:

          Add to Reading List

          Source URL: seccap.iisec.ac.jp

          Language: Japanese - Date: 2015-10-01 02:58:56
            10Computer network security / Computer security / Cybercrime / National security / CyberPatriot / Internet censorship / Capture the flag / AP Computer Science / Security hacker / Science Bowl / Video game

            PicoCTF: A Game-Based Computer Security Competition for High School Students Peter Chapman Carnegie Mellon University

            Add to Reading List

            Source URL: jburket.com

            Language: English - Date: 2015-04-08 00:10:41
            UPDATE