Home contact@systechgroup.in
🎯 CTF Contest 13: SOC Malware Hash Analysis — New Challenge Live!

Available CTF Challenges

Contest 1: Steganography

Steganography

Level: Intermediate

Status: Live

Contest 2: Networking

Wireshark Challenge

Level: Easy

Status: Live

Contest 3: Cryptography

Cryptography

Level: Intermediate

Status: Live

Contest 4: Forensics

Forensics Challenge

Level: Intermediate

Status: Live

Contest 5: Networking

Networking Forensics

Level: Intermediate

Status: Live

Contest 6: Web Security

Credential Breach

Level: Hard

Status: Live

Contest 7: Networking

Wireshark

Level: Intermediate

Status: Live

Contest 8: OSINT

Open Source Intelligence

Level: Intermediate

Status: Live

Contest 9: Bruteforce

Bruteforce Attack

Level: Easy

Status: Live

Contest 10: Reconnaissance

Reconnaissance

Level: Intermediate

Status: Live

Contest 11: Reporting

VAPT Report Writing

Level: Advanced

Status: Live

Contest 12: Request Forgery

Unlock Rob's Keyphrase

Level: Advanced

Status: Live

Contest 13: SOC Analysis

Malware Hash Analysis

Level: Advanced

Status: Live

Contest 14: Web Security

Login bypass

Level: Intermediate

Status: Live

Contest 15: Web Security

SQL Injection

Level: Intermediate

Status: Coming Soon

Contest 16: Binary Exploitation

Buffer Overflow

Level: Advanced

Status: Coming Soon

Contest 17: Memory Forensics

Memory Dump Analysis

Level: Advanced

Status: Coming Soon

Contest 18: API Security

REST API Exploitation

Level: Intermediate

Status: Coming Soon

Help

If you are facing any issues with the challenges, please follow the instructions below:

Steganography Challenge Rules

Note: For the required environment setup, please use VMware version 17.6.2 or later.

Download VirtualBox File Download Vmware File

Cryptography Challenge Rules

Start Your Challenge

Forensics Challenge Rules

Download File

Networking Forensics Challenge

Challenge Rules

Scenario:

An employee stole the company's confidential data and passed it to an ex-employee of the same company. A suspected laptop is been accessing the company's wifi. These activities are been captured by a wireshark packet file. Analyse these 3 things from the wireshark packet file:

Questions:

Download File

Web Security Challenge Rules

Start Your Challenge

Wireshark Challenge Rules

Download Wireshark File

OSINT Challenge Rules

Scenario:

A person has vanished. but we have his X username. Your task is to use OSINT techniques to uncover their true identity and employment history.

Download Challenge Files

Bruteforce Challenge Rules

An employee set a password on a ZIP file and forgot it!
Can you open it up and find the flag inside?

Download Challenge Files

Reconnaissance Challenge Rules

Start Your Challenge

VAPT Report Writing Challenge Rules

Include in your report:

📁 You have been provided with an Nmap scan file.

📝 Flag: The report file name should be: CTF{yourname_VAPT_Report}

📄 Format: The final report must be in PDF format and follow standard security reporting format.

Download Nmap Scan File Submit Report

Silent Endpoint — Unlock Rob's Keyphrase

Start Your Challenge

SOC Team Malware Hash Analysis Challenge

Scenario: We found a file from SOC team and we are giving the hash of the file. You need to pass the questions.

Provided SOC Hash:

556700ac50ffa845e5de853498242ee5abb288eb5b8ae1ae12bfdb5746e3b7b1

Questions:

  1. Which type of malware is this?
  2. What was it used for (primary objective/impact)?
  3. When was this malware first found/discovered?
  4. What are effective mitigations?
  5. What is the hash algorithm?
  6. Describe what this specific hash represents (file, string, sample), based on open sources.

📝 Instructions: Answer all questions based on your analysis of the provided hash. Use open-source intelligence and malware analysis resources.

📤 Submission: Submit your answers via Instagram DM.

Web Security Challenge

Start Your Challenge

SQL Injection Challenge

Scenario: A web application has been identified with potential SQL injection vulnerabilities. Your mission is to exploit it and retrieve sensitive data.

Challenge Rules:

⚠️ Note: This is a controlled environment. Only exploit the provided target.

Start Your Challenge

Binary Exploitation - Buffer Overflow

Scenario: A vulnerable program has been found that suffers from buffer overflow. Exploit it to gain control of the execution flow and retrieve the flag.

Challenge Rules:

Environment:

You will be provided with a vulnerable binary and the target system details.

Download Binary Access Target Server

Memory Forensics Challenge

Scenario: A memory dump from a compromised system has been captured. Analyze it to uncover malicious activities and extract hidden information.

Challenge Rules:

Tools Recommended:

Volatility Framework, Rekall, or any memory forensics tool.

Download Memory Dump

API Security Challenge

Scenario: A REST API has been deployed with several security vulnerabilities. Your task is to identify and exploit these weaknesses to access protected resources.

Challenge Rules:

API Documentation:

Review the API documentation to understand the endpoints and required parameters.

Access API Download API Documentation