I decided this year during cyber awareness month I was going to finally participate in a Capture the Flag (CTF) competition. After looking around at some of the offerings and following John Hammond on YouTube (https://www.youtube.com/@_JohnHammond) I gravitated towards the Huntress CTF.
Their competition has been spread over all of October, releasing a couple of challenges a day, up until the last week when the challenges began to get tougher. Here are some of the takeaways and highlights from the entire challenge this year.
- A lot of the challenges are really quite easy and when they have put “easy” down they really have meant it. What these challenges have done however is made me realise exactly where the gaps are. Whilst they have been challenging they have also been rewarding. Challenges like BaseFFFF+1 really threw me for a loop as I’d never seen the encoding method used before.
- The community are absolutely awesome, I’ve been able to collaborate with a few people over the last month and have gotten to know these individuals and find out where they are in their learning journey. Don’t get me wrong some of them are sticklers for making sure you spend a reasonable amount of time on a challenge/down a rabbit hole before they will help, it is a competition after all. However, they absolutely do help out and learning from these individuals has been truly amazing. I hope I’ve been able to impart some knowledge to them as much as they have helped me.
- The duration. This for me was a marathon, not a sprint and finding time to tackle the challenges whilst moving house and dealing with a day job has been especially hard. I’ve found getting the laptop out and cracking on with the challenges just as hard as some of the most basic challenges. If you want to spend a day messing about finding flags this one is absolutely not for you. However, if you want to learn over a period of weeks, and collaborate either in a team or just with a bunch of different people then this one really does work.
- Highlight challenges.
- There are quite a few here but the ones I was particularly good at were the OSINT ones (didn’t think I would be but only took me a couple of minutes). These challenges made use of the Geoguesser game:
- Under the Bridge
- Operation Not found
- I also found some of the forensic and miscellaneous challenges quite rewarding, in particular:
- Tragedy Redux
- Operation Eradication
- Rock, Paper, Psychic
- Bable
- There are quite a few here but the ones I was particularly good at were the OSINT ones (didn’t think I would be but only took me a couple of minutes). These challenges made use of the Geoguesser game:
- Time. All in per day I believe the maximum amount of time I spent was about 3 hours. It’s not a small commitment as I alluded to in a previous point particularly if you come across something you’ve never seen before.
Conclusion
So what do I personally think about this CTF. Honestly, if it wasn’t for the community that joined up I probably wouldn’t be doing it again. The time commitment for me particularly with what I’m going through personally at the moment is too much and as a result, it would have put me off playing again should they do it next year. That being said, I am hoping to participate again next year depending on work and personal life. I’m also hoping to take some of these ideas and build my own CTF for work. Would I recommend this to any other cyber security/IT persons? Absolutely, the benefits of the community far outweigh the time requirements. The only thing I would suggest is to make sure that you’re having fun with it. I at some points got quite anxious because I saw there were challenges that were incomplete. This says way more about the type of person I am than the game that the Huntress team put on and please don’t be discouraged.