Capture-The-Flag Badge

293 Completed
6 Exercises
Easy image for CVE-2015-3224

CVE-2015-3224

  • This exercise is a challenge written for Nullcon CTF in 2015
  • Completed by 1424 students
  • Takes Less than an hour on average
  • Rails
  • CWE-284
Easy image for Werkzeug DEBUG

Werkzeug DEBUG

  • This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
  • Completed by 1419 students
  • Takes Less than an hour on average
  • Python
Medium image for Padding Oracle

Padding Oracle

  • This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
  • Completed by 758 students
  • Takes Between 1 and 2 hours on average
  • PHP
Hard image for Luhn

Luhn

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
  • Completed by 553 students
  • Takes Between 2 and 4 hours on average
  • Python
Hard image for Unickle

Unickle

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
  • Completed by 608 students
  • Takes Between 1 and 2 hours on average
  • Python
Hard image for ECDSA

ECDSA

  • This exercise covers the exploitation of a weakness in the usage of ECDSA
  • Completed by 310 students
  • Takes Between 2 and 4 hours on average
  • PHP/Apache/Mysql
  • crypto