What is a CTF (Capture the Flag)?
CTFs are security competitions where you solve challenges and capture flags
(strings like SP{...}). They cover web, crypto, binary,
forensics, and networking.
Before you begin — prerequisites
You’ll need a laptop or desktop with virtualization support (Intel VT-x / AMD-V), 20 GB free disk, 4+ GB RAM (8 GB recommended), and internet access.
Install Kali Linux
- Download from https://www.kali.org/get-kali/
- Install VirtualBox or VMware
- Create a Debian 64-bit VM with 2+ CPUs and 4+ GB RAM
- Take a snapshot after install
Essential CTF tools
You will frequently use tools like nmap, gobuster, ffuf, sqlmap, john, hydra, curl, netcat.
CTF Tools — Practical Guides
Approach checklist
- Information gathering (ping, nmap)
- Enumeration (directories, services)
- Exploit safely
- Privilege escalation
- Capture the flag