Challenges
Challenge | What you Will Encounter | Online Round |
---|---|---|
Web Exploitation | Login bypass, cookie manipulation, gaining access to other users' accounts, parameter tampering, and more. | 4 Challenges |
Cryptography | Break ciphers (Caesar, XOR, etc.), decrypt messages, reverse encoding, and uncover keys. | 3 Challenges |
OSINT | Extract data from only public sources like social media manually or using automated tools. This data can be clues or the Flags. | 3 Challenges |
Forensics | Analyze image files, uncover metadata, and extract hidden information | 2 Challenges |
Reverse Engineering | Understand small programs, read code logic, extract hidden strings, and find bypasses. | 1 Challenges |