0 - Zero

Locate and extract the flag by investigating a provided file or image (`zero:welcome`). The goal is to navigate the user profile and identify credentials or indicators of compromise from accessible paths.

10 - Ten

Exploit a vulnerable login form in OWASP Juice Shop using classic SQL Injection techniques to retrieve the flag.

15 - Fifteen

Interact with a restricted terminal environment and extract the contents of the `flag.txt` file using limited command-line capabilities.

17 - Seventeen

Unzip a series of recursively compressed ZIP files, collect password fragments from each layer, and use the final combined password to extract the flag.