The challenge involves cracking a WiFi password using captured WiFi packets.
The challenge involves finding a flag related to a person named Blacky on a specific Instagram page.
The challenge involves extracting information from a PDF document related to mobile forensics.
The challenge involves analyzing a Word document to extract and analyze a suspicious executable file.
The challenge involves decrypting a given ciphertext to obtain the flag.
The challenge involves exploiting a Local File Inclusion (LFI) vulnerability to retrieve a flag.
The objective of the Compromised CTF challenge is to extract a hidden flag embedded within a complex set of files and directories.
The objective of the Linux Memory Usage CTF challenge is to efficiently manage and process memory usage data for different processes based on given inputs.
The objective of the Lokami Temple CTF challenge is to navigate a graph problem by determining the shortest path for all doors to exit.
The objective of the DigiDoc CTF challenge is to gain root access to the target server by exploiting various vulnerabilities, including FTP, web application vulnerabilities (such as upload and IDOR), and privilege escalation.