Rawsec is a French and International security Capture The Flag team. It was created in January 2016 by noraj. We frequently participate in both online and on site security Capture The Flag competitions, publish write-ups on CTF tasks.
More details about what is a CTF.
Rawsec currently has:
- 1 active member:
- noraj - [Captain] - Student Cyber-security engineer - CTFTime profile
- Several part-time players
Rawsec is also a blog talking about IT and news but it is more focus on security and linux. The blog is also hosting Rawsec's (CTF team) write-ups. The blog is managed by noraj (Alexandre ZANNI).
In Cyber-Security, Capture the Flag (CTF) is a special kind of information security competitions. There are two main types of CTFs: Jeopardy and Attack-Defence.
CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, conducting and reacting to the sort of attacks found in the real world or improve their pentesting skills.
Jeopardy-style CTFs has a couple of questions (tasks/challenges) in range of categories. For example, Web Exploitation, Forensics, Cryptography, Binary Exploitation or something else. Team can gain some points for every solved task. More points for more complicated tasks usually. In some CTFs, the next task in chain can be opened only after some team solve previous task. Then the game time is over sum of points shows you a CTF winer.
Attack-defence or Wargame is another interesting kind of competitions. Here every team has own network (or only one host) with vulnarable services. Your team has time for patching your services and developing exploits usually. So, then organizers connects participants of competition and the wargame starts! You should protect own services for defence points and hack opponents for attack points. Historically this is a first type of CTFs, everybody knows about DEF CON CTF - something like a World Cup of all other competitions.
CTF games often touch on many other aspects of information security: cryptography, steganography, binary analysis, reverse engeneering, mobile security, programming and others. Good teams generally have strong skills and experience in all these issues.
The tracking of the CTF's is often done in the website ctftime.org and write-ups will be written by the players (and sometimes organizers) and will be hosted on team's blog or git repository.