Welcome to CTF Wiki!
CTF (Capture The Flag) started from DEFCON CTF, a competitive game among computer security enthusiasts, originally hosted in 1996.
CTF covers a wide range of fields. Along with the evolving security technology, the difficulty of CTF challenges is getting harder and harder. As a result, the learning curve for beginners is getting steeper. Most online information is scattered and trivial. Beginners often don't know how to systematically learn CTF, which requires a lot of work and effort.
In order to let those people who are interested in CTFs start easily, in October 2016, CTF Wiki was established on Github. Along with gradually improved content over time, CTF Wiki has received lots of appreciation from security enthusiasts, many of those are guys that we think we would never meet.
As a freedom site, primarily focusing on recent CTFs, CTF Wiki introduces the knowledge and techniques in all aspects of CTF to make it easier for beginners to learn CTF.
Now, CTF Wiki mainly contains the basic skills for CTF, but we are working hard to improve the following contents.
- Advanced skills used in CTF
- Special topics appearing in CTF
For the above-mentioned parts to be improved, please refer to Projects which details what are planned.
Although now CTF Wiki mainly focus CTF, it is not strictly limited to CTF topics. In the future, CTF Wiki will include
- Tools used in security research
- Increased discussion of security in the world
In addition, given the following two points
- Information about technology should be openly shared.
- As new techniques are always being developed, old techniques will start to fade over time and they should be replaced with new techniques.
Therefore, CTF Wiki will never publish books.
Finally, originating from the community, as an independent organization, CTF Wiki advocates freedom of knowledge, will never be commercialized, and will always maintain the character of independence and freedom.
CTF Wiki uses mkdocs to show its contents. And it is deployed at https://ctf-wiki.org.
It can also be deployed locally, with the following steps:
# 1. clone
git clone https://github.com/ctf-wiki/ctf-wiki.git
# 2. requirements
pip install -r requirements.txt
# generate static file in site/
python3 scripts/docs.py build-all
# deploy at http://127.0.0.1:8008
python3 scripts/docs.py serve
** A local instance of mkdocs is dynamically updated, for instance when a markdown file is modified, the corresponding page will be modified too.**
If you just want to view it statically, try Docker!
Note: after using mkdocs-material-insiders, we haven't support building website with docker.
docker run -d --name=ctf-wiki -p 4100:80 ctfwiki/ctf-wiki
And then access http://localhost:4100/ .
Firstly, learn some basic security knowledge through online reading.
Secondly, CTF Wiki has two sister projects.
- All of the challenges that are mentioned are in the ctf-challenges repository, you can locate them with their corresponding category.
- The tools mentioned in the CTF Wiki are constantly added to the ctf-tools repository.
We welcome to write content for the wiki and share what you have learned.
Before you decide to contribute content, please read CONTRIBUTING.
Thank you to all the people who have already contributed to CTF Wiki.
- Ability to learn new things quickly
- Different ways of thinking
- A love for solving problems
- Interesting security techniques
- Memorable and enriching experience
Before reading the Wiki, we hope to give you some advice:
- Learn to ask smart-questions .
- Learn to use Google Search for self-improvement.
- Be good at least one programming language, such as Python.
- Practice is the most important learning tool.
- Maintain the passions and desire to learn about new techniques.
The security circle is small and the areas of exploration is vast. Let's get started with CTF Wiki!