Cyber Security Competition Study Guide

To study you should try challenges yourself as well as read writeups about how people approached solving these types of problems.

Write ups from previous competitions:

Defcon CTF:

CSAW Archives:

Sample Problems

Brute force hash collision:

SQL Injections:

PHP and Linux

Now some XXS:

Shellcode and Linux.
ssh -p 7771

Exploit a programs memory
ssh port 22

I found there is mail running and stuff in log files. Cypher has some mail.


Other Material