Exploit an SQL injection vulnerability to retrieve admin credentials and obtain the flag.
Exploit insecure deserialization to gain shell access and retrieve the flag.
Analyse linux file system
The objective of the Brute Force Frenzy CTF challenge is reverse engineer a binary to find the correct key for verification.
The objective of the Character Journey CTF challenge is to find and retrieve the flag from a web application by exploiting IDOR.
The objective of the Just A Normal EXE CTF challenge is analyze a malware file to find the flag.
The objective of the Lock? CTF challenge is to recover the flag from a BitLocker-encrypted disk image by analyzing logs and decrypting the image.
The objective of the Memory CTF challenge is identify the user that was created based on a memory dump from a Windows system
The objective of the Mystery File CTF challenge is deobfuscate a script within a ZIP file to uncover a domain and retrieve the flag from the associated webpage.
The objective of the SSH Compromised CTF challenge is analyze a large log file to identify a compromised SSH login.