A comprehensive collection of Capture The Flag (CTF) challenges from CCSC 2020 designed for hands-on learning in penetration testing, forensics, and exploitation.
All challenges for the CCSC 2020 CTF
This repository serves as an educational resource for security enthusiasts, students, and professionals looking to practice and improve their skills in penetration testing, cryptography, forensics, and red teaming through real CTF challenges. Users can deploy isolated challenge environments using Docker to simulate realistic attack and defense scenarios.
It is recommended to use Docker and Docker Compose to run the challenges to maintain environment isolation and avoid dependency conflicts. Some challenges may run without Docker but using the containerized setup ensures consistency and security. This repository is intended for educational use and skill development rather than direct deployment in production environments.
Install Docker on your system
Install Docker Compose
Clone the repository from GitHub
Use the provided scripts to build and run challenges within Docker containers
docker-compose up
Starts the challenge environment containers ensuring isolation and proper setup
docker-compose down
Stops and removes the challenge environment containers