

ĬTF is also popular in military academies. They can also be incorporated in a classroom setting, and have been included in undergraduate computer science classes such as Introduction to Security at the University of Southern California. A study conducted by researchers at Adelphi University found using CTF exercises was a highly effective way to instill cybersecurity concepts in an enjoyable manner. Applications ĬTF is mainly used for cybersecurity education, as studies show students tend to respond better to interactive methods demonstrated through CTF exercises than in a traditional classroom setting. Since CTF’s creation at DEFCON, there have been other CTF competitions hosted including CSAW CTF and Plaid CTF. This is done by attempting to replace the opponent's “flag” or data file with their own. In the attack-defense format, competing teams must defend their vulnerable computer systems while attacking the opponents. Some examples of categories are programming, networking, and reverse engineering.


In the Jeopardy format, participating teams must complete as many challenges of varying point values from a given category. Both formats test participant’s knowledge in cybersecurity, but differ in objective. There are two ways CTF can be played: Jeopardy and Attack-Defense. The conference hosts a weekend of cybersecurity competitions including CTF. It was first developed in 1993 at DEFCON, the largest cybersecurity conference in the United States hosted annually in Las Vegas, Nevada. The game is based on the traditional outdoor sport of the same name.Ĭapture the Flag (CTF) is a cybersecurity competition that is used as a test of security skills. Competitions can include hiding flags in hardware devices, they can be both online or in-person, and can be advanced or entry-level. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges). It can either be for competitive or educational purposes. A team competing in the CTF competition at DEF CON 17Ĭapture the Flag ( CTF) in computer security is an exercise in which "flags" are secretly hidden in purposefully- vulnerable programs or websites.
