Capture-The-Flag Badge

301 Completed
6 Exercises
Easy image for CVE-2015-3224

CVE-2015-3224

  • This exercise is a challenge written for Nullcon CTF in 2015
  • Completed by 1467 students
  • Takes Less than an hour on average
  • Rails
  • CWE-284

 

Easy image for Werkzeug DEBUG

Werkzeug DEBUG

  • This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
  • Completed by 1462 students
  • Takes Less than an hour on average
  • Python

 

Medium image for Padding Oracle

Padding Oracle

  • This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
  • Completed by 781 students
  • Takes Between 1 and 2 hours on average
  • PHP

 

Hard image for Luhn

Luhn

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
  • Completed by 571 students
  • Takes Between 2 and 4 hours on average
  • Python

 

Hard image for Unickle

Unickle

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
  • Completed by 623 students
  • Takes Between 1 and 2 hours on average
  • Python

 

Hard image for ECDSA

ECDSA

  • This exercise covers the exploitation of a weakness in the usage of ECDSA
  • Completed by 318 students
  • Takes Between 2 and 4 hours on average
  • PHP/Apache/Mysql
  • crypto