The objective of the Lock? CTF challenge is to recover the flag from a BitLocker-encrypted disk image by analyzing logs and decrypting the image.
The objective of the Memory CTF challenge is identify the user that was created based on a memory dump from a Windows system
The objective of the Mystery File CTF challenge is deobfuscate a script within a ZIP file to uncover a domain and retrieve the flag from the associated webpage.
The objective of the SSH Compromised CTF challenge is analyze a large log file to identify a compromised SSH login.
The challenge involves bypassing anti-brute force measures to retrieve the flag without brute-forcing.
The objective of the Assemble challenge is to correctly configure the hardware components and troubleshoot any technical issues to display the flag on the LCD.
The objective of the BlackHole challenge is to find the flag hidden within the URL or the web page's content.
The challenge involves extracting three parts of the flag from a video, with two parts embedded in the video itself and one part hidden in the audio spectrum.
The challenge requires finding a flag using OSINT techniques.
The objective of this challenge is to find the flag hidden in the HTML files served by the servers in the packet capture.