Skip to content
Go back

Hacking Legally: My Journey into CTFs and How You Can Start Too

Edit page

🚀 TL;DR – How to Start in 60 Seconds

  1. Play Bandit.
  2. Register on picoCTF.
  3. Join a local or online community (like UNTCybersecurity Club).
  4. Keep a repo of your notes & writeups (like my writeups).

Table of contents

Open Table of contents

🧠 Why This Post?

Hi, I’m Kalyan — kite, gh0st, M4j0rZer0, l0new0lf — many hacker names; don’t you want one? I like breaking, building, and fixing things. About me.

If you’re a student or beginner interested in cybersecurity, this might be your journey too.


🎯 My journey into CTFs

Like many others, I started by tinkering with Linux, solving small puzzles, and doing challenges on platforms like OverTheWire. Eventually, I began participating in actual CTFs (mostly online).

Recently, I took part in CANSecCTF at OU in Norman and ended up winning 2nd place (and a Nintendo Switch Lite 🎮). That lit a spark in me, and I’ve been hooked ever since.

Find my writeups here at KC writeups. Give it a ⭐ if it helps!


🚩 What Are CTFs?

CTFs — or Capture the Flag competitions — are like digital treasure hunts in the world of cybersecurity. Participants solve puzzles to discover hidden strings called flags, like flag{welc0m3_t0_TH3_w0r1d_0f_Cybers3curity}, then submit them for points. Think hacking, pentesting — but legally, and for fun!

Want the formal scoop? Check out Wikipedia.

There are different flavors of CTFs:

Common challenge categories: Web exploitation, Binary exploitation, Cryptography, Reverse Engineering, Forensics, OSINT, Steganography, etc.

🐞 CTFs vs Bug Bounties: CTFs are great for learning in a controlled environment. Bug bounties are real-world — higher stakes, but higher rewards. Start with CTFs to build confidence.


🧪 Try a Mini Challenge!

Ready for your first real flag? Let’s see if you can crack this tiny puzzle:

Wm14aFozdDVNSFZ5WDJGZlpuSmxRR3NoYm1kZlIyVnVhWFVrWDJKMVpDRjlDZz09Cg==

💡 Hint: Try base64, then see if it looks familiar…

🔓 Click here for the flag `flag{y0ur_a_fre@k!ng_Geniu$_bud!}`

🔍 Stuck? Scroll down to the solution when you’re ready.


🧰 What Skills You’ll Need

Start small — you don’t need to be an expert to begin!

Here are foundational skills that will help:


🧭 A Beginner’s Roadmap

  1. Play Bandit on OverTheWire
  2. Register and solve a few problems on picoCTF
  3. Join UNTCybersecurity Club or band together
  4. Keep your writeups in a repo (like mine)
  5. Follow upcoming competitions on CTFtime.org
  6. Ask questions, read others’ writeups, and participate!

💻 Practice, practice, practice.

PlatformDescriptionLink
picoCTFBeginner-friendly with story-based CTFspicoctf.org
OverTheWireLinux war games via SSHoverthewire.org
247CTFCompetitive Jeopardy-style CTFs247ctf.com
TryHackMeGuided labs for real-world skillstryhackme.com
HackTheBoxVM-based hacking playgroundhackthebox.com
VulnHubDownloadable VMs for hackingvulnhub.com

🧪 About My CSCE 3550 Guest Lecture

During the Summer 2025 semester, I delivered a guest lecture on Capture the Flag (CTF) competitions for the Summer 2025 session of CSCE 3550: Foundations of Cybersecurity, taught by Dr. Lotfi Ben Othmane.

During the talk, I:

Thank you to the students who attended and shared kind words after the session!

📂 You can find the slides here: CTF Guest Lecture Slides (PDF)

🧭 This post will continue to serve as a reference hub for all the resources mentioned in the lecture — feel free to explore the links and start your CTF journey!


🔗 Resources


👋 Adios

This blog’s a work-in-progress — like all of us. I’m no guru, just curious (you should be too). Pick a challenge, break stuff, learn something.

Stuck? Need ideas? Ping me at LinkedIn or GitHub.

Happy hacking 🥷 — Bon voyage, KC.


🔓 Solution

🔥 echo "Wm14aFozdDVNSFZ5WDJGZlpuSmxRR3NoYm1kZlIyVnVhWFVrWDJKMVpDRjlDZz09Cg==" | base64 -d
ZmxhZ3t5MHVyX2FfZnJlQGshbmdfR2VuaXUkX2J1ZCF9Cg==
🔥 echo "Wm14aFozdDVNSFZ5WDJGZlpuSmxRR3NoYm1kZlIyVnVhWFVrWDJKMVpDRjlDZz09Cg==" | base64 -d | base64 -d
flag{y0ur_a_fre@k!ng_Geniu$_bud!}

Edit page
Share this post on:

Previous Post
VoxPilot: Private Voice-Augmented AI Assistant for Hands-Free Web Browsing
Next Post
Job Application Tracker — an AI automation workflow using n8n