Capture-The-Flag Badge

This badge is a mashup of challenges created by PentesterLab for the previous Ruxcon and Nullcon CTF. Little details are given on how to solve them as part of the course

6 exercises 342 completed

Exercises

Medium
ctf badge icon
CVE-2015-3224
  • This exercise is a challenge written for Nullcon CTF in 2015
  • Completed by 1632 students
  • Takes < 1 Hr. on average
  • Rails
  • CWE-284

Medium
ctf badge icon
Werkzeug DEBUG
  • This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
  • Completed by 1619 students
  • Takes < 1 Hr. on average
  • Python

Medium
ctf badge icon
Padding Oracle
  • This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
  • Completed by 849 students
  • Takes 1-2 Hrs. on average
  • PHP

Hard
ctf badge icon
Luhn
  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
  • Completed by 627 students
  • Takes 2-4 Hrs. on average
  • Python

Hard
ctf badge icon
Unickle
  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
  • Completed by 670 students
  • Takes 1-2 Hrs. on average
  • Python

Hard
ctf badge icon
ECDSA
  • This exercise covers the exploitation of a weakness in the usage of ECDSA
  • Completed by 362 students
  • Takes 2-4 Hrs. on average
  • PHP/Apache/Mysql
  • Crypto