diff --git a/docs/infrastructure/overview.md b/docs/infrastructure/overview.md new file mode 100644 index 00000000..3cebede2 --- /dev/null +++ b/docs/infrastructure/overview.md @@ -0,0 +1,91 @@ +# Infrastructure + +Infrastructure in CTFs focuses on identifying and exploiting weaknesses in servers, cloud environments, and containerized systems. Challenges may involve privilege escalation, misconfigurations, insecure deployments, or lateral movement within networks. Competitors often analyze system logs, file permissions, and service configurations to gain unauthorized access or persistence. + + + diff --git a/docs/network-security/overview.md b/docs/network-security/overview.md new file mode 100644 index 00000000..0fd3c572 --- /dev/null +++ b/docs/network-security/overview.md @@ -0,0 +1,91 @@ +# Network Security + +Network security in CTFs involves analyzing and exploiting vulnerabilities in network protocols, configurations, and traffic. Challenges often include packet analysis, protocol exploitation, encryption weaknesses, and bypassing firewalls or intrusion detection systems. Competitors may work with tools like Wireshark, Nmap, Metasploit, and Burp Suite to inspect traffic, uncover sensitive data, and exploit misconfigured services. Attacks range from ARP spoofing and DNS poisoning to exploiting web APIs, network services, or authentication flaws. Mastery of these techniques helps in both offensive security and defensive hardening of networks. + + + diff --git a/mkdocs.yml b/mkdocs.yml index eb813d7e..ebd07056 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -172,6 +172,14 @@ nav: - What is the Heap: "binary-exploitation/what-is-the-heap.md" - Heap Exploitation: "binary-exploitation/heap-exploitation.md" + # Network Security Section + - Network Security: + - Overview: "network-security/overview.md" + + # Infrastructure Section + - Infrastructure: + - Overview: "infrastructure/overview.md" + # FAQ Section - FAQ: - How to connect to services: "faq/connecting-to-services.md"