Level: Intermediate
Status: Live
Level: Easy
Status: Live
Level: Intermediate
Status: Live
Level: Intermediate
Status: Live
Level: Intermediate
Status: Live
Level: Hard
Status: Live
Level: Intermediate
Status: Live
Level: Intermediate
Status: Live
Level: Easy
Status: Live
Level: Intermediate
Status: Live
Level: Advanced
Status: Live
Level: Advanced
Status: Live
Level: Advanced
Status: Live
Level: Intermediate
Status: Live
Level: Intermediate
Status: Coming Soon
Level: Advanced
Status: Coming Soon
Level: Advanced
Status: Coming Soon
Level: Intermediate
Status: Coming Soon
If you are facing any issues with the challenges, please follow the instructions below:
Note: For the required environment setup, please use VMware version 17.6.2 or later.
Download VirtualBox File Download Vmware FileAn employee stole the company's confidential data and passed it to an ex-employee of the same company. A suspected laptop is been accessing the company's wifi. These activities are been captured by a wireshark packet file. Analyse these 3 things from the wireshark packet file:
A person has vanished. but we have his X username. Your task is to use OSINT techniques to uncover their true identity and employment history.
Download Challenge FilesAn employee set a password on a ZIP file and forgot it!
Can you open it up and find the flag inside?
📁 You have been provided with an Nmap scan file.
📝 Flag: The report file name should be: CTF{yourname_VAPT_Report}
📄 Format: The final report must be in PDF format and follow standard security reporting format.
Download Nmap Scan File Submit ReportScenario: We found a file from SOC team and we are giving the hash of the file. You need to pass the questions.
556700ac50ffa845e5de853498242ee5abb288eb5b8ae1ae12bfdb5746e3b7b1
📝 Instructions: Answer all questions based on your analysis of the provided hash. Use open-source intelligence and malware analysis resources.
📤 Submission: Submit your answers via Instagram DM.
Scenario: A web application has been identified with potential SQL injection vulnerabilities. Your mission is to exploit it and retrieve sensitive data.
⚠️ Note: This is a controlled environment. Only exploit the provided target.
Start Your ChallengeScenario: A vulnerable program has been found that suffers from buffer overflow. Exploit it to gain control of the execution flow and retrieve the flag.
You will be provided with a vulnerable binary and the target system details.
Download Binary Access Target ServerScenario: A memory dump from a compromised system has been captured. Analyze it to uncover malicious activities and extract hidden information.
Volatility Framework, Rekall, or any memory forensics tool.
Download Memory DumpScenario: A REST API has been deployed with several security vulnerabilities. Your task is to identify and exploit these weaknesses to access protected resources.
Review the API documentation to understand the endpoints and required parameters.
Access API Download API Documentation