What is a Capture the Flag?
Capture the flags are essentially virtualized hacking challenges. An attacking machine and a target machine are configured on a segmented network, creating a safe place to practice penetration testing and critical thinking. The idea is to go through the methodology used in penetration testing in order to breach the machine. Ordinarily, these flags are located in the /root/ directory and may include some additional steps beyond just getting root (admin) access on the target machine.
What do I need to start?
The barrier to entry is very low to get into these. You need a desktop or laptop with the appropriate specifications, virtualization software, and the willingness to learn (even when it gets frustrating). I’ll be writing tutorials on how to setup a lab environment in the future. Stay tuned!