Challenges

ChallengeWhat you Will EncounterOnline Round

Web Exploitation

Login bypass, cookie manipulation, gaining access to other users' accounts, parameter tampering, and more.

4 Challenges

Cryptography

Break ciphers (Caesar, XOR, etc.), decrypt messages, reverse encoding, and uncover keys.

3 Challenges

OSINT

Extract data from only public sources like social media manually or using automated tools. This data can be clues or the Flags.

3 Challenges

Forensics

Analyze image files, uncover metadata, and extract hidden information

2 Challenges

Reverse Engineering

Understand small programs, read code logic, extract hidden strings, and find bypasses.

1 Challenges