Capture The Flag at Agility 2018
Published Jun 20, 2018
Version 1.0Was this article helpful?
Hi John,
I done a CTF at the F5 user group in Glasgow, the premise was to find the vulnerability, exploit it and then use ASM to mitigate the attack after it was found. It was really good and insightful.
My question is, will this CTF be made public after Agility in the public domain in the form of VM images? With possible walkthroughs?
Cheers,
Thomas.