From 6117636277cd535d045f1e45a3570294a17df3d9 Mon Sep 17 00:00:00 2001 From: santosomar Date: Fri, 20 Oct 2017 13:50:49 -0400 Subject: [PATCH] adding CTF information --- capture_the_flag/README.md | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 capture_the_flag/README.md diff --git a/capture_the_flag/README.md b/capture_the_flag/README.md new file mode 100644 index 0000000..9c3142e --- /dev/null +++ b/capture_the_flag/README.md @@ -0,0 +1,7 @@ +# Capture The Flag (CTF) Information +Capture the flag (CTF) is a computer security competition that is designed for educational purposes. In Lesson 6.4, "Learning How to Host Enterprise Capture the Flag Events" of the "Enterprise Penetration Testing and Continuous Monitoring (the Art of Hacking Series) LiveLessons" video course, you learned how these CTF work and how you can potentially create these as a "cyber range" within your enterprise. The following are a few links that provide numerous resources and references to past and current CTF events, as well as online practice sites. + +* https://ctftime.org +* https://ctf365.com +* http://captf.com +* https://pentesterlab.com/exercises