• Home
  • About CSA
    • Defense
    • Offense
    • FAQ
  • Learn
    • Getting Started in Cyber Security
    • Weekly Meetings (Zoom)
    • Past Meetings
    • Are you curious?
      Do you like Puzzles?
    • Capture the Flag (CTF)
  • News
  • Events
    • Calendar
    • Meetings
    • Competitions
      • NCL Competition
  • Join CSA
  • Contact
CSA: Cyber Security Association @ BYU-IdahoCSA: Cyber Security Association @ BYU-Idaho
  • Home
  • About CSA
    • Defense
    • Offense
    • FAQ
  • Learn
    • Getting Started in Cyber Security
    • Weekly Meetings (Zoom)
    • Past Meetings
    • Are you curious?
      Do you like Puzzles?
    • Capture the Flag (CTF)
  • News
  • Events
    • Calendar
    • Meetings
    • Competitions
      • NCL Competition
  • Join CSA
  • Contact

Discovering weaknesses in order to make weak things become strong Cyber Offense
NCL Logo

CTF - Capture the Flag Challenges

Offensive security is about uncovering weaknesses in systems in order to secure them. This is accomplished through techniques such as vulnerability assessments, penetration testing, reverse engineering, and packet analysis.

In order to apply what we learning in offensive security, we use a game called capture the flag (CTF). Think of this game like a digital scavenger hunt or cyber escape room. In the game (challenge) we use tools and techniques to uncover clues in the game In order to gain points and uncover hidden "flags". You solve parts of the puzzle by using problem solving, creativity, and cyber to help you find clues for the next part of the challenge.

Hacking for Good

Trace Labs Missing Persons

Security Researchers (aka White Hat Hackers) can use their skills in may good ways. One way is by helping to find missing people. Using OSINT (open source intelligence) such as public social media sites, facial recognition, and other sources, people can volunteer to find missing people. Trace Labs is one such organization that organizes this.

Bug Bounty Hunting

Bug Bounty Hunting is another way that security researchers can use their skills. "Hack the Pentagon" is an example of an annual bug bounty program. Many software companies such as Google, Apple, and Facebook have ongoing bug bounty programs, all of which pay you when you find a bug.

CSA Mission Statement

Our mission is to enhance student learning and professional growth by providing opportunities for students to better prepare themselves academically and professionally. We accomplish this through competitions, learning activities, special guest speakers, student and alumni networking, and providing groups to study for cyber security related certifications.
- CSA Presidency
Join Button

© 2018-2023 · BYU Idaho - Cyber Security Association