- Linux Basics
- Networking Basics
- Web application basic
- Cryptography basics
Linux
- Privilege Escalation vulnerabilities
Networking
- Server based vulnerabilities
- Framework based vulnerabilities
Web Application
- OWASP Top 10 applicaion
- Oauth vulnerabilities
Advanced:
- Popular CVE's
- Mobile Application Vulnerabilities
Capture the Flag (CTF) in computer security is an exercise in which "flags" are secretly hidden in purposefully-vulnerable programs or websites. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges). You can find the list of websites to practice CTF in Resources section.