Capture-The-Flag Badge

266 Completed
6 Videos
6 Exercises
Easy image for CVE-2015-3224

CVE-2015-3224

  • This exercise is a challenge written for Nullcon CTF in 2015
  • Completed by 1200 students
  • Takes Less than an hour on average
  • Rails
Easy image for Werkzeug DEBUG

Werkzeug DEBUG

  • This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
  • Completed by 1193 students
  • Takes Less than an hour on average
  • Python
Medium image for Padding Oracle

Padding Oracle

  • This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
  • Completed by 677 students
  • Takes Between 1 and 2 hours on average
  • PHP
Hard image for Luhn

Luhn

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
  • Completed by 493 students
  • Takes Between 2 and 4 hours on average
  • Python
Hard image for Unickle

Unickle

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
  • Completed by 547 students
  • Takes Between 1 and 2 hours on average
  • Python
Hard image for ECDSA

ECDSA

  • This exercise covers the exploitation of a weakness in the usage of ECDSA
  • Completed by 282 students
  • Takes Between 2 and 4 hours on average
  • PHP/Apache/Mysql
  • crypto