Islander Cyber Society

Texas A&M University - Corpus Christi

Attack & Defend CTF Training

CTF Training Platform

CTF TRAINING FACILITY

◢ Authorized Personnel Only ◣

TRAINING SECTORS

01 10

◢ REVERSE ENGINEERING

Binary analysis, assembly language, and malware reverse engineering protocols. Authorized for code deconstruction operations.

◢ WEB EXPLOITATION

SQL injection, XSS, CSRF protocols. Authorized for web application vulnerability assessment operations.

◢ CRYPTOGRAPHY

Encryption algorithms, hash functions, cryptographic protocol analysis. Authorized for cipher operations.

◢ NETWORK SECURITY

Traffic analysis, service enumeration, protocol exploitation. Authorized for network penetration operations.

◢ FORENSICS

Digital evidence investigation, file system analysis. Authorized for data recovery operations.

◢ PWN & BINARY EXPLOITATION

Buffer overflow, format strings, heap vulnerabilities. Authorized for binary exploitation operations.

◢ NEW TO CTFs?

Never competed in a Capture The Flag competition before? No problem! We welcome beginners and provide structured training to help you develop into a competitive cyber athlete.

◢ NEXT TRAINING SESSION

Coming Soon

Check back for details on our next training session

Join Islander Cyber Society for weekly hands-on CTF training sessions. All TAMU-CC students welcome!

Islander Cyber Society

Texas A&M University - Corpus Christi

Official Cybersecurity Club