Capture the Flag (CTF) Training
Recon Cyber Security provided best accredited CTF Training that offers the best CTF Training on practical exams that help aspirants gain professional skills. Students are given the opportunity to gain practical experience of participating in real CTF Challenge projects. The Recon Cyber Security CTF Training Course in Delhi is run under the highly experienced industry professionals as it operates on a mix of practical learning and learning theory. This type of comprehensive behavioral training with good exposure facilitates the complete transition of the student into a professional.Capture The Flag (CTF) Training is a kind of information security competition that challenges contestants to solve a variety of tasks. Like: basic programming exercises, to hacking your way into a server to steal data.
What is Capture of Flag (CTF)?
The rules for the handling of the flag also vary from game to game and deal mostly with the disposition of the flag after a failed attempt at capturing it. In one variant, after a player is tagged while carrying the flag, it is returned to its original place. In another variant, the flag is left in the location where the player was tagged. This latter variant makes offensive play easier, as the flag will tend, over the course of the game, to be moved closer to the dividing line between territories. In some games, it is possible for the players to throw the flag to teammates. As long as the flag stays in play without hitting the ground, it is allowed for the players to pass.
When the flag is captured by one player, they're not safe from being tagged, unless they trip. Sometimes, the flag holder may not be safe at all, even in their home territory, until they obtain both flags, thus ending the game. But they have the option to return to their own side or hand it off to a teammate who will then carry it to the other side. In most versions, they may not throw the flag but only hand it off while running. The game is won when a player returns to their own territory with the enemy flag or both teams' flags. Also, as a general rule, the flag carrier may not attempt to free any of their teammates from jail.
Course Content and Syllabus for CTF Training
Recon CTF Training content fulfills the requirement of both basic as well as advanced level CTF training.The Recon CTF Training in Delhi is designed based on industry recommendations and student needs.Recon is the best CTF Training center in Delhi The CTF Training syllabus is...
CTF Training Syllabus
- Finding Files
- Services in Kali SSH Service
- FTP Services
- HTTP Service
- Mysql Services
- Service Management
- Locate
- Which
- Find
- Sed
- Awk
- Cut
- Sort
- Grep
- Head
- Tail
- Wget
- Cat
- Getting start with NC
- Connecting to a Server
- Fetching HTTP header
- Chatting
- Creating a Backdoor
- Verbose Mode
- Save Output to Disk
- TCP Delay Scan
- UDP Scan
- Reverse TCP Shell Exploitation
- Randomize Port
- File Transfer
- Reverse Netcat Shell Exploitation
- Banner grabbing
- Port Scanning With Nmap & Wireshark
- TCP Connect Scan with wireshark
- Network Sweeping with wireshark
- SYN Scan with wireshark
- UDP Scan with wireshark
- FIN Scan with wireshark
- Null Scan with wireshark
- OS Discovery with wireshark
- NSE Scripts with wireshark
- Nmap Firewall Scan
- Overview
- DNS Enumeration
- Forward DNS Lookup
- Reverse DNS Lookup
- Zone Transfers
- NetBIOS & SMB Enumeration
- Null Sessions
- Enum4Linux
- SMB NSE Scripts
- MSQL Enumeration
- MSSQL Enumeration
- SMTP Enumeration
- VRFY Script
- Python Port
- SNMP Enumeration
- SNMP MiB
- SNMPWalk
- Overview
- Google Search
- Google Hacking
- GHDB
- Directory Bruteforce Attack
- Dirb
- Dirbuster
- Dirsearch
- Metasploit
- Php reverse shell
- Python reverse shell
- Perl reverse shell
- Bash reverse shell
- Msfvenom shell
- Overview
- Vulnerable Code
- Stack Overflow
- Overview
- Fuzzing
- Crash Replication
- Controlling EIP
- Introducing Shellcode
- Bad Characters
- Redirecting Execution
- Introducing Mona
- Shellcode Payload
- Controlling EIP
- Locating Space
- First Stage Shellcode
- Locating RET
- Generating Shellcod
- Overview
- Finding Exploits
- Exploit – DB
- Fixing Exploits 1
- Fixing Exploits 2
- Cross – Compiling
- Python HTTP Server
- php http server
- HFS Tool
- Netcat
- CURL
- SMB Server
- Powershell File Transfer
- Bitsadmin
- Wget
- TFTP
- Python
- Suid Binaries
- Absuing Sudo ‘ s Right
- Kernel Exploit
- Path Variables
- Multiple Ways to edit / etc / passwd fill
- Windows Privilege Escalation
- Weak File Permissions
- Always Install Elevated
- Bypass UAC
- Kernel Exploits
- Authentication Bypass
- Error Based Enum
- Blind SQL Injection
- Attack Proxies
- SQLMap
- Overview
- Crunch
- Passing the Hash
- Password Profiling
- Online Attacks
- Medusa
- Ncrack
- Hydra
- Password Hashes
- Cracking Hashes
- LM / NTLM
- Overview
- Port Forwarding
- SSH Tunnels
- Dynamic Proxies
- Proxy Chains
- Overview
- AUX Modules
- SNMP Modules
- SMB Modules
- WEBDAV Modules
- Database Services
- Exploits
- Payloads
- Meterpreter
- Meterpreter in Action
- Additional Payloads
- Binary Payloads
- Multihandler
- Porting Exploits
- Post Exploitation
- Overview
- Shellter
- Veil – Evasion
- thefatrat
- Joomla Lab Setup & Pentesting
- Drupal Lab Setup & Pentesting
- Duration 2.5 to 3 Months
- CTF Expert Toolkit
- Online & Offline Classes Available
- CTF Challenge Certificate
- 1 Month Internship Certification
- Training by experienced trainners
- Can Ask Direct questions and can resolve techincal questions with trainners
- Standard classes, Group challenges , review sessions
- 1 year Membership at Recon Force Training
- Certificate After Training
- Standard Study Environment
- Best Training Environment
- Checkpoint based training
- High speed internet.