Description of the challenges
Jeopardy-style CTFs present a set of challenges that participants can solve in any order. Challenges are often categorized by different domains of cybersecurity like cryptography, forensics, web exploits, binary exploitation, and reverse engineering. They are also assigned point values based on their difficulty level. Participants or teams accumulate points for each solved challenge, and the one with the highest score at the end of the competition wins.
On the other hand, Attack-Defense CTFs simulate a more real-world scenario. Each team is given their own network or system to defend while simultaneously trying to attack other teams’ systems. Points are gained for successfully defending your network, and for compromising others’. This format not only tests participants’ ability to exploit vulnerabilities but also their skills in securing a system from threats.
Rules and scoring system
Details about the difficulty levels
Resources for learning (especially for beginners)