"Everybody's gotta learn, nobody's born knowing." - Harper Lee



Most people will find their way here at some point. Knowing where to look to find answers to your questions isn't always an easy task. Luckily it's a lot easier these days to track down answers and find resources to help you. We have a list of google searches that should help get you back on track.

Crypto and Stego can be words many people have never heard of. Here are some search terms that can help get you started.
https://www.google.com/search?q=introduction+to+cryptography
https://www.google.com/search?q=what+is+stegonography

Locks. Physical security is often neglected in CTF competitions and in organizations in general. For those who like to work with there hands, this is an excellent category to start with. All locks are at the FRSecure headquarters. Track them down in the lab and try your hand at picking some.
https://www.google.com/search?q=famous+lock+picking+channel+on+youtube
A few lockpicks are available to experiment but buying your own and learning this skill may be useful if you ever get locked out.
https://www.google.com/search?q=lockpick+set

Web challenges have been designed to be solved with just a browser. These should be very low barrier to entry challenges. Don't be fooled into thinking this will be a cakewalk though. They can be very tricky.
https://www.google.com/search?q=introduction+to+web+application+hacking

Reverse Engineering can be intimidating to think about. Especially if you've never written a script or program before. It's a lot easier to get into it than you may think though. You don't actually need to know how to write a program to reverse engineer what a program is doing.
https://www.google.com/search?q=how+to+reverse+engineer+a+binary+file

Forensics. This is a broad subject but is usually involves analyzing what happened on a system or network. Currently, this topic only has packet analysis challenges. It will be expanded later.
https://en.wikipedia.org/wiki/Wireshark

Cracking in this context refers to cracking a password hash, process, or security function that has been put in place.
https://www.google.com/search?q=cracking+password+hashes
https://www.google.com/search?q=cracking+wireless

boot2root is one of the categories that requires some software and walk throughs if you've never worked with a virtual system. Luckily there are a lot of walkthroughs about setting up a virtual machine and how to hack boot2roots. Due to the amount of technical setup these challenges have the highest base point value.
https://www.google.com/search?q=boot2root
https://www.google.com/search?q=setting+up+a+virtual+machine

Misc is miscellaneous challenges that combine aspects of several skills or they don't fall exactly under any particular skill listed here. These require a bit of thinking outside the box. Google is your friend here. Let the search for answers help you learn along the way.