Flag4 CTF
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 6
Abstract
In today’s world a place where there is a large scope for Security, many people are busy building applications, web pages and many more but no one actually concentrates on security aspect of it. As the technology increases, the flaws in the security system also increases. The CTF machine is one such solution for this problem, where the person who is learning hacking can use these kind of machines and learn security in a much deeper way. Capture The Flag are games where the hackers have to solve puzzles and find bugs so that they can get through system flaws and find flag, which is the main goal. Typical CTFs offer many challenges, most commonly the hackers have to exploit some kind of service so that you can get remote access to the server and read the content of the file that contains a special string called “flag”, which is a proof that he she has hacked the system. Dr. C. Umarani | R P Shruti "Flag4 CTF" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35734.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35734/flag4-ctf/dr-c-umarani
Authors and Affiliations
Dr. C. Umarani
Performance Analysis of V-Blast Spatial Multiplexing with Ml and MMSE Equalisation Techniques using Psk Modulation
Now a day wireless technologies face the challenges of multipath signal fading, attenuation and phase delay which led to the interference between users and there is the possibility of limited spectrum. Linear and Non-Lin...
Key Aspect for Approach of Smart Grid Design System
With development of smart grid technology, power generation and distribution network acts as new brain in this field. In this technology, the network will not only get going to integrated and set communicable all over th...
Elements and Applications of Smart Grid Technologies
Nowadays, the smart powered strength device is going through a revolutionary change in global with the decarbonize electrical energy furnish to change growing older property and manage the herbal assets about modern info...
New Era of Web Security by Implementing of Penetration Testing
Computer and network security are one in every of the foremost difficult topics within the data Technology analysis community. Web security could be vital subjects which will have an effect on a large vary of web users....
Effect of substituents on infrared, H1 and C13NMR spectra of Schiff's bases derived from Furfuryl amine
Several substituted Schiff,s bases have been derived from furfuryl amine and their IR, 1H and 13C NMR spectra are recorded. The IR ?C=N(cm-1 ), NMR d(ppm) of CH=N spectral data have been correlated with Hammett substitue...