4 - Four

Access and explore an exposed FTP server tied to an OWASP Juice Shop challenge to retrieve confidential internal files, including the flag.

6 - Six

Interact with a newly added OWASP Juice Shop AI-based feature and identify how to retrieve a hidden flag through it.

9 - Nine

Analyze forensic artifacts to determine the real name of the threat actor based on their Telegram activity and archived file data.

Get Clawed

The objective of this challenge is to analyze a disk image and network traffic capture to uncover hidden data exfiltration techniques, reverse custom encryption mechanisms, and ultimately retrieve the attacker’s payload or flag.