CTF - Capture the Flag Challenges
Offensive security is about uncovering weaknesses in systems in order to secure them. This is accomplished through techniques such as vulnerability assessments, penetration testing, reverse engineering, and packet analysis.
In order to apply what we learning in offensive security, we use a game called capture the flag (CTF). Think of this game like a digital scavenger hunt or cyber escape room. In the game (challenge) we use tools and techniques to uncover clues in the game In order to gain points and uncover hidden "flags". You solve parts of the puzzle by using problem solving, creativity, and cyber to help you find clues for the next part of the challenge.
Hacking for Good
Trace Labs Missing Persons
Security Researchers (aka White Hat Hackers) can use their skills in may good ways. One way is by helping to find missing people. Using OSINT (open source intelligence) such as public social media sites, facial recognition, and other sources, people can volunteer to find missing people. Trace Labs is one such organization that organizes this.
Bug Bounty Hunting
Bug Bounty Hunting is another way that security researchers can use their skills. "Hack the Pentagon" is an example of an annual bug bounty program. Many software companies such as Google, Apple, and Facebook have ongoing bug bounty programs, all of which pay you when you find a bug.