Overview
This course aims to teach learners how to apply concepts from Capture the Flag (CTF) competitions to real-world scenarios, specifically in bug bounties and vulnerability disclosure processes. The course covers topics such as different types of CTFs, commonalities, specialized CTFs, securing a router, and the vulnerability disclosure process. The teaching method includes a breakdown of concepts and real-life examples. This course is intended for cybersecurity professionals interested in enhancing their skills in bug hunting and vulnerability research.
Syllabus
Intro
Who am I
Objectives
Quick definitions
Types of CTF
Where to find CTF
Common CTF commonalities
Specialized CTFs
Kali
Not being realistic
Too vulnerable
gimmicky game
bug bounties
open CTFs
security research
security team
OSWP
How to secure a router
Setup
Password Change
Login
What do we do
DLink
Vulnerability disclosure
Learning the process
DEFCON 404
Cert
Full Disclosure
Not all CTS are garbage
Hacking Glasses
Future Speaking engagements
Questions
Next logical step
Taught by
Bugcrowd