The objective of this challenge is to find the flag hidden in the HTML files served by the servers in the packet capture.
The challenge involves cracking a WiFi password using captured WiFi packets.
The challenge involves finding a flag related to a person named Blacky on a specific Instagram page.
The challenge involves extracting information from a PDF document related to mobile forensics.
The challenge involves analyzing a Word document to extract and analyze a suspicious executable file.
The challenge involves decrypting a given ciphertext to obtain the flag.
The challenge involves exploiting a Local File Inclusion (LFI) vulnerability to retrieve a flag.
The objective of the Compromised CTF challenge is to extract a hidden flag embedded within a complex set of files and directories.
The objective of the Linux Memory Usage CTF challenge is to efficiently manage and process memory usage data for different processes based on given inputs.
The objective of the Lokami Temple CTF challenge is to navigate a graph problem by determining the shortest path for all doors to exit.