![]() We, the team behind CTF365, decided that is time to change the way CTF is designed and held by bringing a brand new approach and push security gamification at a bigger scale: World Wide. So why another CTF when there are already so many? Artificial – Many CTFs don't resemble a real-life network and restrict the players with plenty of rules.Not beneficial for work – Because CTFs aren't centrally organized, there are no universal scores that are meaningful to a penetration tester's hiring manager.Few and far between – CTFs don't happen on a regular schedule, and they happen all over the globe.On-site – Many CTFs require you to be physically present at the venue.Short duration – CTFs typically only take between 24 hours and a few days.However, traditional CTFs have these issues: Teams often show an unparalleled level of effort and dedication. Today's CTF competitions are very diverse, going all the way to attack-and-defense scenarios where Red Teams and Blue Teams play against each other. At the same time, it is entertaining, challenging, community-driven and hands-on for the students and employees participating in it. Learning information security through gamification increases students/employee engagement, improves retention rate and speeds up the learning curve/process. Gamification improves skills, and provides education and training. The best way to learn is to learn on the job. You can check CTF Time to see where a CTF has taken place, which are organized by CS faculties, companies or even governments agencies. The DefCon conference had one of the first CTF competitions. In fact is quiet old, as old as the Internet: It is called CTF – Capture The Flag. Information Security through Gamification is not a brand new concept. ![]() ![]() I have to mention that HaS is not open for business yet because of one simple reason: We are a very small team. When we were building HaS we had to come up with a way to create a spin off in case things were not moving in the direction that we anticipated. In October 2011, we started the HackaServer Project, a web security testing platform using the power of crowd sourcing. Note: If this article is TL DR, then I recommend you just go to create an account, create a team and start play with it.Ī little bit of history before introducing CTF365 I'd especially like to thank hdmoore and ckirsch at Rapid7 as well as Mati Aharoni at Offensive Security. By Guest Blogger Marius Corîci, īefore I start, I would like to thank the Metasploit team at Rapid7, and the Kali Linux team at Offensive-Security for their kindnesses to let us use their logos on our platform. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |