{"id":1568,"date":"2023-02-28T13:57:48","date_gmt":"2023-02-28T12:57:48","guid":{"rendered":"https:\/\/cyberhero.rs\/?page_id=1568"},"modified":"2024-02-19T14:28:18","modified_gmt":"2024-02-19T13:28:18","slug":"trening-materijali","status":"publish","type":"page","link":"https:\/\/sajberheroj.rs\/en\/trening-materijali\/","title":{"rendered":"Training materials"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc-row-container container\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"section-title\">\n    <h2>Training materials for preparation for SCC<\/h2>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element post-formatting\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"font-weight: 400;\">Introductory materials <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.youtube.com\/watch?v=8ev9ZX9J45A\"><span style=\"font-weight: 400;\">What is CTF? An introduction to security Capture The Flag competitions<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.youtube.com\/watch?v=Lus7aNf2xDg\"><span style=\"font-weight: 400;\">How To Learn Hacking With CTFs<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/ctf101.org\/\"><span style=\"font-weight: 400;\">CTF 101<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Platforms for beginners:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/play.picoctf.org\/\"><span style=\"font-weight: 400;\">picoGym<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; easy challenges from previous picoCTFs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/level1.idocker.hacking-lab.com\/\"><span style=\"font-weight: 400;\">Ethical hacking for beginners by Hacking-lab<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Popular CTF Platforms:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/tryhackme.com\/\"><span style=\"font-weight: 400;\">TryHackMe<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.hackthebox.com\/\"><span style=\"font-weight: 400;\">HackTheBox<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/cryptohack.org\/\"><span style=\"font-weight: 400;\">CyptoHack<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.vulnhub.com\/\"><span style=\"font-weight: 400;\">VulnHub<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/overthewire.org\/wargames\/\"><span style=\"font-weight: 400;\">OverTheWire<\/span><\/a><\/li>\n<\/ul>\n<h2><\/h2>\n<p><span style=\"font-weight: 400;\">Platform with CTF announcements and published solutions:<\/span><\/p>\n<p><a href=\"https:\/\/ctftime.org\/\"><span style=\"font-weight: 400;\">CTFtime<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Recommended Links:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Web<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/basicpentestingjt\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Basic pentesting<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/owasptop10\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Owasp Top 10<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/vulnversity\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Vulnversity<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/www.youtube.com\/watch?v=S2mQBXcW3P0&amp;list=PL1H1sBF1VAKX9Mz0UVU2eR7EdGmtb5XJK\"><span style=\"font-weight: 400;\">Web challenges writeups<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reverse engineering<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/introtox8664\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Intro to x86-64<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/ccghidra\"><span style=\"font-weight: 400;\">TryHackMe &#8211; CC: Ghidra<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/reverselfiles\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Reversing ELF<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/www.youtube.com\/watch?v=xnGNStPg4GI&amp;list=PL1H1sBF1VAKXYkYf20zni60THPxkbSC8i\"><span style=\"font-weight: 400;\">Reverse engineering challenges writeups<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cryptography<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/cryptographyfordummies\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Cryptography for dummies<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/encryptioncrypto101\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Encryption 101\u00a0<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/www.youtube.com\/playlist?list=PL1H1sBF1VAKU05UWhDDwl38CV4CIk7RLJ\"><span style=\"font-weight: 400;\">Crypto challenges writeups<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forensics<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Steganography<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/tryhackme.com\/room\/ccstego\"><span style=\"font-weight: 400;\">TryHackMe &#8211; CC: Steganography<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/www.youtube.com\/watch?v=I-HQJPoTZSc&amp;list=PL1H1sBF1VAKV6rTEh76pxQKgeFwme5gsT\"><span style=\"font-weight: 400;\">Steganography challenges writeups<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">PCAP analysis<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/tryhackme.com\/room\/wiresharkthebasics\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Wireshark: The Basics<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/www.youtube.com\/watch?v=iQxLsURS1Mo&amp;list=PL1H1sBF1VAKVPNh6Q8k1fpU97vhJc_c45\"><span style=\"font-weight: 400;\">PCAP challenges writeups<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Binary exploitation &#8211; PWN<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/tryhackme.com\/room\/pwn101\"><span style=\"font-weight: 400;\">TryHackMe &#8211; Pwn 101<\/span><\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/guyinatuxedo.github.io\/index.html\">Nightmare<\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/pwn.college\/\"><span style=\"font-weight: 400;\">PWN college<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/www.youtube.com\/watch?v=yH8kzOkA_vw&amp;list=PL1H1sBF1VAKVg451vJ-rx0y_ZuQMHPamH\"><span style=\"font-weight: 400;\">Binary Exploitation challenges writeups<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"\u0422\u0440\u0435\u043d\u0438\u043d\u0433 \u043c\u0430\u0442\u0435\u0440\u0438\u0458\u0430\u043b\u0438 \u0437\u0430 \u043f\u0440\u0438\u043f\u0440\u0435\u043c\u0443 \u0437\u0430 SCC \u0423\u0432\u043e\u0434\u043d\u0438 \u043c\u0430\u0442\u0435\u0440\u0438\u0458\u0430\u043b\u0438 What is CTF? An introduction to security Capture The Flag competitions How To Learn Hacking With CTFs CTF 101 \u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 \u0437\u0430 \u043f\u043e\u0447\u0435\u0442\u043d\u0438\u043a\u0435: picoGym - easy challenges from previous picoCTFs Ethical hacking for beginners by Hacking-lab \u041f\u043e\u043f\u0443\u043b\u0430\u0440\u043d\u0435 CTF \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435: TryHackMe HackTheBox CyptoHack VulnHub OverTheWire \u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u0441\u0430 \u043d\u0430\u0458\u0430\u0432\u0430\u043c\u0430 CTF-\u043e\u0432\u0430&hellip;","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1568","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/pages\/1568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/comments?post=1568"}],"version-history":[{"count":4,"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/pages\/1568\/revisions"}],"predecessor-version":[{"id":2280,"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/pages\/1568\/revisions\/2280"}],"wp:attachment":[{"href":"https:\/\/sajberheroj.rs\/en\/wp-json\/wp\/v2\/media?parent=1568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}