The goal of this challenge is to reverse engineer an obfuscated **Khronos SPIR-V binary**, reconstruct the logic used to generate an output image, and recover the original flag hidden within its data transformations.
The goal of this challenge is to analyze suspicious network traffic to identify ARP poisoning activity and extract the exfiltrated flag data.
The goal of this challenge is to analyze and decrypt files extracted from a ZIP archive using a known plaintext attack and reverse engineer a bundled Python executable to extract the final flag.
The goal of this challenge is to analyze a firmware file and determine the correct keypad input to unlock an IoT system running on Wokwi simulation.
The goal of this challenge is to analyze a suspicious document file to uncover hidden malicious content and extract the flag.
The goal of this challenge is to identify the WebSocket endpoint that the attacker connected to by analyzing network traffic.
The goal of this challenge is to extract the credentials used by the attacker to successfully authenticate on the server via WebSocket.
The purpose of this challenge is to identify and extract a base64-encoded command hidden in WebSocket traffic that reveals the flag.
The purpose of this challenge is to identify and exploit a SQL injection vulnerability in a user search feature, reverse the password obfuscation method, and retrieve the flag by logging in as the administrator.
The objective of the MCC 2024 Box challenge is to gain root access to the machine by exploiting vulnerabilities and misconfigurations.