The goal of this challenge is to analyze a firmware file and determine the correct keypad input to unlock an IoT system running on Wokwi simulation.
The goal of this challenge is to analyze a suspicious document file to uncover hidden malicious content and extract the flag.
The goal of this challenge is to identify the WebSocket endpoint that the attacker connected to by analyzing network traffic.
The goal of this challenge is to extract the credentials used by the attacker to successfully authenticate on the server via WebSocket.
The purpose of this challenge is to identify and extract a base64-encoded command hidden in WebSocket traffic that reveals the flag.
The purpose of this challenge is to identify and exploit a SQL injection vulnerability in a user search feature, reverse the password obfuscation method, and retrieve the flag by logging in as the administrator.
The objective of the MCC 2024 Box challenge is to gain root access to the machine by exploiting vulnerabilities and misconfigurations.
The objective of the DeepFake challenge is analyze the provided .h5 file to retrieve the flag.
The objective of the iamspeed challenge is to analyze the Python-compiled executable to retrieve and decode the flag.
The objective of the Into The Matrix challenge is to decode the contents of an NPY file to retrieve the flag.