Capture
The
Flag
NAME:
Team Name:
Introduction
The CTF Problem
Steps to Solve
The Solution
Workplace Relevance
Tell your audience what you intend to cover in your project. This is the purpose of your communication.
In Section 1, provide some background of the category of your CTF challenge.
Introduce the audience to the problem and tell us how you plan to approach it and get the solution.
In Section 2, cover the steps you used to solve the problem. This may cover multiple solves.
In Section 3, talk about how you found the solution and discuss the pitfalls and recommendations when facing these types of problems.
In Section 4, talk about the relevance of Capture the Flag problems to the workplace and your job role.
2
CTF Category Description
Before presenting this problem, discuss the category of the CTF challenge and the relevant skills needed to solve this type of problem.
Answer the four questions below in your slide and make these questions your talking points.
Describe the category of question that you attempted.
What is the important background knowledge needed?
How does this relate to the Ethical Hacking course?
What lab in the course covered the topic from this CTF problem?
3
Introduction to the Problem
Delete the image above and insert your own
Sample text for narration: We open the .pcap using Wireshark and set a filter for the File Transfer Protocol (FTP) using “ftp” in the display filter box and click Apply to show only the FTP traffic in the capture file.
4
Working Toward a Solution
Delete the image above and insert your own
Sample text for narration: Right-click one of the packet frames (below frame #71) and choose the Follow > TCP Stream to show the conversation between the FTP server and the client machine. Note: TCP is the Transmission Control Protocol, a connection-oriented protocol.
You may choose to add additional slides.
5
Arriving at the Solution
In the ‘Follow TCP Stream’ popup window, search for the flag, in the format of UMGC-XXXXX (below, UMGC-ABC123)
This provided me with the flag and allowed me to solve the network capture problem for Team #.
The screenshot below includes the date/time from the host system.
Delete the image above and insert your own
Sample text for narration: In the Follow TCP Stream pop-up window, search for the flag, in the format of UMGC-XXXXX (below, UMGC-ABC123).
Write out the flag in your documentation. Your screenshot of the Follow TCP Stream pop-up window must include the date/time from the host system. Each student is responsible for providing at least one screenshot as shown below.
6
Strategies, Pitfalls, Lessons Learned
In this section, discuss some of the strategies you used to solve your CTF problem, as well as some of the pitfalls that can lead to the wrong path. This will all be part of the lessons learned section that will help you know how to approach this kind of problem.
7
The Relationship to the Workplace
In this section, discuss how you think Capture the Flag competitions can benefit you in the workplace.
8
Summary
This is your summary and your last opportunity to connect with your audience.
Do not merely repeat your agenda topics. Add one to two important details about each main point to review for your audience.
What is/are the main takeaway(s)?
9
References
The example above uses IEEE style. Ask your instructor for clarification on the style to be used.
A narration for this slide is not required.
10
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more