CTF Challenges

Test your skills with hands-on cybersecurity challenges

65
Challenges
0
Solved
65
Unsolved
14600
Total Points
πŸ”

Windows Registry Analysis

IntermediateForensics

Analyze Windows registry files to find evidence and the flag.

forensicsregistrywindows
⭐300
0 solves
πŸ•΅οΈ

Web Archive Investigation

IntermediateOSINT

Use web archives to find deleted or changed content containing the flag.

osintarchivewayback-machine
⭐250
0 solves
βš™οΈ

Network Protocol Reverse

AdvancedReverse

Reverse engineer a custom network protocol to communicate with a server.

reverseprotocolnetwork
⭐500
0 solves
🎯

PDF Metadata

BeginnerMisc

Extract metadata from a PDF file to find the flag.

miscpdfmetadata
⭐80
0 solves
πŸ”

ROT13 Variant

BeginnerCrypto

A custom ROT cipher has been used. Find the rotation value and decrypt.

cryptorotsubstitution
⭐60
0 solves
πŸ”

Timeline Analysis

AdvancedForensics

Create a timeline of events from system logs to find when the flag was accessed.

forensicstimelinelogs+1
⭐400
0 solves
πŸ•΅οΈ

Flight Tracking

IntermediateOSINT

Track a flight using public flight data to find the flag.

osintflighttracking
⭐200
0 solves
βš™οΈ

Anti-Debugging Techniques

AdvancedReverse

Bypass anti-debugging techniques in a binary to analyze it.

reverseanti-debuggingbypass
⭐450
0 solves
🎯

Whitespace Programming

IntermediateMisc

Execute a program written in the Whitespace programming language.

miscwhitespaceesolang
⭐250
0 solves
🌐

Race Condition Exploit

AdvancedWeb

Exploit a race condition in the payment processing system to get free items.

webrace-conditionconcurrency+1
⭐450
0 solves
πŸ”

Padding Oracle Attack

AdvancedCrypto

Exploit a padding oracle vulnerability in CBC mode to decrypt the flag.

cryptopadding-oraclecbc+1
⭐450
0 solves
πŸ”

File Carving

AdvancedForensics

Carve files from a disk image to find hidden data and the flag.

forensicsfile-carvingrecovery
⭐350
0 solves
πŸ•΅οΈ

Company Research

IntermediateOSINT

Research a company using public records and find hidden information.

osintcompanyresearch
⭐300
0 solves
βš™οΈ

Python Bytecode

IntermediateReverse

Reverse engineer Python bytecode to recover the original source and flag.

reversepythonbytecode
⭐250
0 solves
🎯

DNS TXT Record

BeginnerMisc

Find the flag hidden in a DNS TXT record.

miscdnstxt-record
⭐100
0 solves
🌐

XXE Injection

AdvancedWeb

Exploit XML External Entity processing to read sensitive files from the server.

webxxexml+1
⭐350
0 solves
πŸ”

Vigenère Cipher

IntermediateCrypto

Decrypt a message encrypted with Vigenère cipher. The key is a common word.

cryptovigenerepolyalphabetic
⭐200
0 solves
πŸ”

Password Protected ZIP

IntermediateForensics

A ZIP file is password protected. Crack the password to extract the flag.

forensicszippassword+1
⭐250
0 solves
πŸ•΅οΈ

Phone Number Lookup

BeginnerOSINT

Find information about a phone number and locate the flag.

osintphonelookup
⭐100
0 solves
βš™οΈ

Firmware Analysis

AdvancedReverse

Extract and analyze firmware to find hardcoded credentials and the flag.

reversefirmwareembedded
⭐400
0 solves
🎯

Polyglot File

AdvancedMisc

A file that is valid in multiple formats. Extract data from each format.

miscpolyglotfile-format
⭐350
0 solves
🌐

SSRF Internal Network

AdvancedWeb

Exploit a Server-Side Request Forgery vulnerability to access internal services.

webssrfnetwork+1
⭐400
0 solves
πŸ”

Diffie-Hellman Key Exchange

AdvancedCrypto

Intercept and exploit a weak Diffie-Hellman key exchange to recover the shared secret.

cryptodiffie-hellmankey-exchange+1
⭐400
0 solves
πŸ”

Log File Analysis

IntermediateForensics

Analyze server logs to find evidence of an attack and the flag.

forensicslogsanalysis+1
⭐200
0 solves
πŸ•΅οΈ

Username Enumeration

IntermediateOSINT

Find all accounts associated with a username across different platforms.

osintusernameenumeration
⭐250
0 solves
βš™οΈ

Malware Analysis

AdvancedReverse

Analyze a malware sample in a safe environment to understand its behavior.

reversemalwareanalysis+1
⭐450
0 solves
🎯

Unicode Steganography

IntermediateMisc

Find a message hidden using Unicode zero-width characters.

miscunicodesteganography
⭐200
0 solves
🌐

JWT Token Forgery

AdvancedWeb

A JWT token is used for authentication. Can you forge a token to gain admin access?

webjwtauthentication+1
⭐350
0 solves
πŸ”

AES ECB Mode Weakness

IntermediateCrypto

AES in ECB mode has been used. Exploit the weakness to decrypt the flag.

cryptoaesecb+1
⭐300
0 solves
πŸ”

LSB Steganography

IntermediateForensics

A message is hidden in an image using LSB steganography. Extract it.

forensicssteganographylsb+1
⭐250
0 solves
πŸ•΅οΈ

Email Investigation

IntermediateOSINT

Investigate an email address to find associated accounts and the flag.

osintemailinvestigation
⭐200
0 solves
βš™οΈ

Android APK Analysis

IntermediateReverse

Analyze an Android APK file to find hardcoded secrets and the flag.

reverseandroidapk+1
⭐300
0 solves
🎯

Audio Spectrogram

IntermediateMisc

Analyze an audio file's spectrogram to find a hidden message.

miscaudiospectrogram
⭐250
0 solves
🌐

File Upload Bypass

IntermediateWeb

Upload a malicious file to gain remote code execution on the server.

webfile-uploadrce+1
⭐200
0 solves
πŸ”

Hash Collision

IntermediateCrypto

Find two different messages that produce the same MD5 hash.

cryptohashmd5+1
⭐250
0 solves
πŸ”

Memory Dump Analysis

AdvancedForensics

Analyze a memory dump to find passwords and the flag.

forensicsmemoryvolatility+1
⭐400
0 solves
πŸ•΅οΈ

Geolocation Challenge

IntermediateOSINT

Find the exact location where a photo was taken using metadata and visual clues.

osintgeolocationgps+1
⭐250
0 solves
βš™οΈ

Obfuscated Code

IntermediateReverse

Deobfuscate JavaScript code to understand its functionality and find the flag.

reverseobfuscationjavascript
⭐250
0 solves
🎯

Barcode Scanning

BeginnerMisc

Scan a barcode to reveal the flag.

miscbarcodescanning
⭐60
0 solves
πŸ’»

String Algorithms

IntermediateCoding

Solve string manipulation problems to extract the flag.

codingstringsalgorithms
⭐200
0 solves
🌐

CSRF Token Bypass

AdvancedWeb

Find a way to bypass CSRF protection and perform unauthorized actions.

webcsrfsecurity+1
⭐300
0 solves
πŸ”

XOR Cipher

BeginnerCrypto

A message has been encrypted using XOR. Find the key and decrypt it.

cryptoxorstream-cipher
⭐100
0 solves
πŸ”

Image Metadata

BeginnerForensics

A flag is hidden in the metadata of an image file. Extract it.

forensicsexifmetadata+1
⭐75
0 solves
πŸ•΅οΈ

Reverse Image Search

IntermediateOSINT

Use reverse image search to find the original source and the flag.

osintimage-searchreverse-search
⭐200
0 solves
βš™οΈ

Packed Binary

IntermediateReverse

Unpack and analyze a packed binary to find the flag.

reversepackingunpacking
⭐300
0 solves
🎯

Brainfuck Interpreter

IntermediateMisc

Run a Brainfuck program to get the flag output.

miscbrainfuckesolang
⭐200
0 solves
πŸ’»

Graph Traversal

IntermediateCoding

Implement BFS or DFS to traverse a graph and find the flag.

codinggraphbfs+1
⭐250
0 solves
🌐

Stored XSS Attack

IntermediateWeb

A comment system is vulnerable to XSS. Inject a script to steal admin cookies.

webxssjavascript+1
⭐150
0 solves
πŸ”

RSA Weak Key

IntermediateCrypto

A weak RSA key has been used. Factor the modulus and decrypt the message.

cryptorsafactorization+1
⭐200
0 solves
πŸ”

PCAP Analysis

IntermediateForensics

Analyze a network capture file to find the flag hidden in the traffic.

forensicspcapnetwork+1
⭐200
0 solves
πŸ•΅οΈ

Domain WHOIS Investigation

BeginnerOSINT

Use WHOIS data to find information about a domain and locate the flag.

osintwhoisdomain
⭐75
0 solves
βš™οΈ

Simple Crackme

BeginnerReverse

Reverse engineer a simple crackme program to find the correct password.

reversecrackmedisassembly
⭐150
0 solves
🎯

QR Code Puzzle

BeginnerMisc

Scan multiple QR codes to piece together the flag.

miscqr-codepuzzle
⭐75
0 solves
πŸ’»

Dynamic Programming Problem

IntermediateCoding

Solve a classic dynamic programming problem to get the flag.

codingdynamic-programmingalgorithms
⭐200
0 solves
🌐

SQL Injection Basics

BeginnerWeb

A vulnerable login form is waiting for you. Can you bypass authentication using SQL injection?

websqlinjection+1
⭐75
0 solves
πŸ”

Base64 Encoded Secret

BeginnerCrypto

A secret message has been encoded multiple times. Decode it to find the flag.

cryptobase64encoding
⭐75
0 solves
πŸ”

Deleted File Recovery

BeginnerForensics

A file was deleted from a disk image. Recover it to find the flag.

forensicsfile-recoverydisk-image
⭐100
0 solves
πŸ•΅οΈ

Social Media Sleuth

BeginnerOSINT

Find information about a target using only publicly available social media data.

osintsocial-mediainvestigation
⭐100
0 solves
βš™οΈ

Strings in Binary

BeginnerReverse

Analyze a binary file to find readable strings and the flag.

reversestringsbinary
⭐100
0 solves
🎯

Morse Code

BeginnerMisc

Decode a Morse code message to find the flag.

miscmorseencoding
⭐50
0 solves
πŸ’»

Binary Search Implementation

BeginnerCoding

Implement a binary search algorithm to find the flag.

codingbinary-searchalgorithms
⭐75
0 solves
🌐

The Leaky Login

BeginnerWeb

A fintech startup is getting strange login attempts. Investigate the login endpoint and find the vulnerability.

webauthenticationhttp
⭐50
0 solves
🌐

Allsafe Tea Shop Investigation

IntermediateWeb

A suspicious tea shop server has been compromised. Use the terminal interface to investigate the system and find all hidden flags.

webforensicsterminal+1
⭐200
0 solves
πŸ”

Basic Encryption

BeginnerCrypto

Decrypt this message to find the flag. The encryption method is simple.

cryptoencryptioncaesar
⭐50
0 solves
πŸ’»

Array Manipulation Challenge

BeginnerCoding

Solve this coding challenge related to array operations.

codingarraysalgorithms
⭐50
0 solves
Showing 65 of 65 challenges