CTF is recommend here.
But it is not clear how relevant it is to real hacking. For example, it mentions reverse engineering below. How important it is to participate in rev CTF? It seems to be most of the CTF are made up. Do they really reflect the vulnerabilities binaries in real applications have?[https://youtu.be/8ev9ZX9J45A?t=105](https://youtu.be/8ev9ZX9J45A?t=105)
It also mentions, pwn, crypto, web, misc in the video. It seems the only thing relevant is web.
Could anybody explain why the CTF matters for real applications? Thanks.