Relevance of CTF to real hacking

CTF is recommend here.

[https://www.reddit.com/r/hacking/comments/a3oicn/how_to_start_hacking_the_ultimate_two_path_guide/](https://www.reddit.com/r/hacking/comments/a3oicn/how_to_start_hacking_the_ultimate_two_path_guide/)

But it is not clear how relevant it is to real hacking. For example, it mentions reverse engineering below. How important it is to participate in rev CTF? It seems to be most of the CTF are made up. Do they really reflect the vulnerabilities binaries in real applications have?

[https://youtu.be/8ev9ZX9J45A?t=105](https://youtu.be/8ev9ZX9J45A?t=105)

It also mentions, pwn, crypto, web, misc in the video. It seems the only thing relevant is web.

Could anybody explain why the CTF matters for real applications? Thanks.

Updates
0

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Menu