CTF Team at the University of British Columbia

Getting Started

This page is meant as a first steps introduction to get you into your CTF journey. There are many online resources related to CTFs and so this page aims to present an effective approach to improving your CTF skills, while also linking to good resources along the way.

The best way to learn is to solve challenges, get stuck, google things, make progress, get stuck again, ask questions, get flag, repeat. You will pick up knowledge, skills and tools along the way.

What are CTFs?

Capture The Flag competitions or “CTFs” for short are competitions in which players attempt to solve computer security related problems in the form of challenges with present vulnerabilities in order to obtain a secret piece of text known as the “flag” and turn it in for points. Problems range widely in focus, from the theoretical aspects of computer science all the way to the applied aspects of system administration and software engineering. It’s a great way to gain a wide breadth of knowledge in all things related to computer systems, while also achieving a sense of accomplishment and competition along the way.


Before you get started working on CTF problems, there’s a minimum subset of tools you’ll need. You’ll need access to a UNIX system, such as Linux or MacOS. If you’re using Windows and don’t want to install a separate partition, you can use a virtual machine or the Windows Subsystem for Linux (WSL). Many of the most common tools you’ll need to know how to use can be found in the picoCTF learning guides. This will give you a base understanding for the largest topics in CTFs and some of the tools you need to have available.

Binary Exploitation / Reverse Engineering

Most problems in CTFs involve developing a good understanding for the functionality of a target and then finding ways to break the target in unintended ways to get access to the flag. The best way to learn any category in a CTF is to complete more CTF problems, learning about more technologies and principles in the process. A good starting point for binary exploitation (also known as “pwn”) and reverse engineering is to complete the starting problems in picoGym. Once you’ve developed some confidence working on these problems, check out pwn.college and ionetgarage for more intermediate-level content.

The above practice resources are mostly focused on Linux-based systems and x86 assembly. There are other resources that focus on other systems such as Windows or Android, but aside from the listed practice resources the next best way to get good is to participate in actual CTFs so you can experience the wide variety of problems CTFs have to offer. You can find some problems and writeups to learn from by also going to CTFtime, which is the most popular site for keeping up with all things CTF.

There are several tools that get used a lot for Linux-based pwn/reversing challenges. You’ll need to learn to use more tools as you encounter new CTF problems, so providing an exhaustive list wouldn’t be of much aid. Some of the ones you’ll definitely need are as follows:


  1. Work through the Monsanto Cryptopals crypto challenges https://cryptopals.com/
    • I also have a work-in-progress companion guide, it currently covers up to set 3 link
  2. For more guided practice, check out https://cryptohack.org/. It covers topics not covered in cryptopals such as Elliptical curve cryptography
  3. Dive straight into CTFs

Important note: Unlike the other CTF categories, I –do not– recommend starting with picoCTF for learning cryptography

Some other learning options, extra additions if they fit your learning style better:

Web Application Security

Web exploits can be easy to get into, but when considering a “base” foundation to get started, I consider the following as prerequisites:

These are good lessons to develop if you’re unsure of where to start for web exploits. Since 90% of the internet runs on Javascript (for some reason), having an understanding of the syntax and conventions in that language will resolve much of the confusion when first starting out. It also goes without saying that knowing the key concepts of the internet from a developer’s perspective also helps with web exploits.

To get started into web hacking, consider the following resources:

  1. picoCTF: The web problems available on picoCTF are a great way to get started on learning the basics of web security from the ground-up. However, you may notice two things after doing a number of picoCTF web problems: the pico challenges are pretty stacked towards classic/popular web exploits, and they will give a steady stream of hints to help you along. After going through them, it’ll be helpful to try out web exploitation in an environment where hints are not as readily available, to intentionally train your recon skills without requiring a guiding hand. If you do get stuck, by all means ask for help or google the writeups, but going in totally blind is the most effective way to develop your auditing skills, granting you the acumen for identifying other exploits that you will see in other CTFs.

  2. Project Juice Shop: A big portion of web application security is auditing and recon - many web-based exploits are similar but different and the scope of web exploits is vast. Being able to correctly identify the key symptoms of a specific vulnerability helps in narrowing down what sorts of exploits you should be crafting, and so researching what kind of bug you’re up against is half the battle. OWASP Juice Shop is a recommended resource for sandboxing web exploits, and is a good way to strengthen your recon skills to find and identify vulnerabilities.

  3. HackerOne CTF: Register for an account on HackerOne and you’ll be able to access a practise CTF (and other good resources for learning) that allows you a competition-like environment to learn about web exploits and get into CTF hacking. After spending time with the first 2 resources, consider checking out HackerOne. These challenges will be on a curve higher than the previous, so they’re good to test and strengthen your skills further when you’ve mastered the other 2. The bonus here is that the challenges may contain multiple flags, allowing you to flex your knowledge and chain together multiple exploits. HackerOne also provides hints along the way, given in increments to prevent people spamming the “give hint” button. Besides streamlining the provision of hints, this forces you to rely more closely on your own recon skills and direct your own research.

Other learning options: