1.
Cryptography: Focuses on breaking encryption systems using weaknesses like small
primes, reused nonces, and padding oracles.
2. Web Exploitation: Involves exploiting vulnerabilities in web applications, such as
SQLi, XSS, and file uploads.
3. Pwn (Binary Exploitation): Targets memory corruption vulnerabilities in binaries, like
buffer overflows and ROP chains
4. Reverse Engineering: Analyzes compiled binaries to understand their logic or bypass
security mechanisms.
5. Forensics: Recovers and analyzes digital data from artifacts like PCAPs, memory
dumps, and disk images.
6. Steganography: Involves hiding and uncovering secret data within media files or
metadata
.
7. Miscellaneous: Covers diverse tasks like OSINT, fuzzing, IoT, and logic puzzles.
1. General Strategy
Strategy Details
Install via Kali Linux/BlackArch: Ghidra, pwntools, Burp Suite, zsteg,
Core Tools
volatility, ffuf, etc.
Create payload cheat sheets for Web (XSS, SQLi), Crypto (XOR, RSA), and
Cheat Sheets
Pwn (ROP chains).
Automation Scripts for brute-forcing, decoding, API interactions.
Chaos Mode Prioritize speed and easy points. Use automation and skip high-difficulty
Tip tasks unless necessary.
2. Categories & Focus Areas
Cryptography
Focus Details
Known Weaknesses Small RSA primes, reused nonces, padding oracles.
Techniques Mod math, stream cipher analysis, frequency attacks.
Tools Python, SageMath, RsaCtfTool, CyberChef.
Web Exploitation
Focus Details
Targets XSS, SQLi, CSRF, JWT, SSTI, SSRF, file uploads.
Tools Burp Suite, curl, ffuf, sqlmap, httpie, Python scripts.
Pwn (Binary Exploitation)
Focus Details
Techniques Buffer overflow, format string, heap attack, ROP chains.
Tools pwntools, gdb, gef, radare2, one_gadget.
Reverse Engineering
Focus Details
Skills Static/dynamic analysis, control flow, anti-debug.
Tools Ghidra, IDA Free, objdump, strace, rizin.
Forensics
Focus Details
Focus Areas PCAP analysis, RAM dumps, deleted files, hidden volumes.
Tools Volatility, Wireshark, binwalk, ExifTool, Autopsy.
Steganography
Focus Details
Focus Areas LSB, image/audio/video manipulation, metadata.
Tools stegsolve, zsteg, steghide, StegCracker, OutGuess.
Miscellaneous
Focus Details
Tasks OSINT, fuzzing, IoT, logic bombs, phishing.
Tools The Harvester, recon-ng, photon, firmadyne.