What to do after CNS

Now that the Computer and Network Security class is over, you can continue exploring the field at least in the following ways.

Playing wargames. You can try one or more of the following:

All these are great ways for you to further toy with binaries, reverse engineering and exploiting.

Capture The Flag contests. CTFtime have an ongoing list of past, present and future contests that you can join with a team. Some of the “holy grails” are the CTF contests organized by DefCon and BlackHat.

Bug bounties. BugCrowd and HackerOne are two platforms that list bug bounties in open and closed source software. Also, the Internet Bug Bounty program has identified some open source projects (Apache, Python, OpenSSL, etc.) as core infrastructure and is sponsoring those who find serious vulnerabilities.

If you have any further questions about this, feel free to contact us. Happy hacking!

cns/resources/what-to-do-after-cns.txt · Last modified: 2018/10/01 20:24 by mihai.dumitru2201
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0