Welcome to the Cybersecurity CTF Challenges

Test your skills by solving various cybersecurity challenges!

To update the website press CTRL + SHIFT + R at the same time! (Requires a Hard Refresh Sometimes)

Challenge 1: Find the Flag [Cyber I - Unit 1]

The flag is hidden in the message. Can you find it?

Hint: The flag starts with 'flag{'.


Challenge 2: XOR Cipher [Cyber I - Unit 3]

The message is encoded using XOR encryption. Find the flag by decoding it.

Message:
0010111000101101001110010101011100101001001100000010111000101010011011110011000100100001001100010011000001010101001000000001011100110010001101110101110000100100001011010010010100100101

Hint: Try XORing with key 'HAX0R'.

Challenge 3: Layered Text [Cyber I - Unit 8]

Theres something with the text at the bottom of this challenge..

Hint: Theres something scrambled in the layers can you find it in the source.

YOU CANT SEE THIS! THIS ELEMENT IS HIDDEN! NOTHING TO SEE HERE! KEEP IT MOVING! flag{hidden_in_layers}

Challenge 4: Steganography [Cyber I - Unit 8]

Download the image and find the hidden message inside it.

This is Tom the Pelican he's got a hidden flag for you to find

Pelican

Hint: Use steganography tools on CTF Tools our website. This one may have been encoded with a different Bit Depth than default.

Challenge 5: Blending in plain sight. [Cyber I - Unit 1]

There is a hidden text within the page that is invisible to the viewer.

Hint: Change the CSS within the source code to make the flag visible

flag{white_on_white}

Challenge 6: Hidden Javascript will reveal the flag. [Cyber I - Unit 1]

There is a hidden Javascript function that will reveal the flag. It will appear at the top of this page when successfully ran.

Hint: Try adding revealFlag() to the console command button! This would normally be done within the browsers console.

Challenge 7: Base 64 Decryption [Cyber I - Unit 1]

Decrypt the hidden base64 key found in the source code of the website and type the flag below.

Hint: Check the source code and use an online decryption software. A good website for this is dcode.fr

Challenge 8: HTML Entity Decryption [Cyber I - Unit 1]

Decrypt the html entities and type the flag below. They always start with &#x for example f.

Find a flag written in html entities and use an online website to decipher. Check the source code between challenges 1-5.

Challenge 9: Hidden Text Hovering[Cyber I - Unit 2]

Find and hover over the right element to find the hidden flag.

Hint: Hover over a specific element on the page to reveal the key.

Challenge 10: Invisible Hidden Buttons [Cyber I - Unit 2]

Theres a button somewhere on this page that reveals a hidden flag.

Hint: Inspect the source code for a button, change the code til visible. Maybe its the position?

Challenge 11: CSS Flag Riddle [Cyber I - Unit 2]

Look at the CSS rules and find the hidden flag.

Hint: The flag might be something obvious and not exactly what the text gives you.

flag{css_color?}

Challenge 12: Hidden Page [Cyber I - Unit 8]

There is a hidden page on this website containing a flag.... if you can find it

Hint: Try common page names used accross different websites using the url following ctfsec.web.app/

Challenge 13: Corrupted File/Filetype Mismatch [Cyber I - Unit 8]

There is a file that seems to be corrupted can you find the flag?

Hint: Try changing the file extension or opening the file in a different program than recommended.

Challenge 14: PGP Hidden Keys with Deciphering [Cyber II - Unit 1]

Your friend sent you an important sensitive message using PGP/RSA with a key length of 3072 can you find and decipher the flag?

PGP Message

Hint: Try changing the file extension or opening in a text editor, search online for a pgp decryptor like https://codref.org/tools/pgp/ Check the source for the PGP Password

Challenge 15: Scrambled Eggs- Base Decryption [Cyber I - Unit 8]

There is a key hidden within this file, find it, convert it and you will find your flag.

Hint: Try changing the file type or opening with another program, then find out what base it was written in and convert it to the original base, then use an online base decryptor to get your flag. (Tools MathTools Base10 -> Base64, Base64.guru Base64 -> ASCII)

Challenge 16: Hovering Hidden Flag[Cyber I - Unit 2]

There is a hidden flag somewhere in this challenge

Hint: Hover over something to find the flag

Challenge 17: Login

Enter your username and password to login. You may have to scroll to the top of the page after clicking the login button to see the form.


Hint: Maybe the user forgot to change the default passwords?

Challenge 18: Hidden Flag In Image [Cyber I - Unit 5]

There is a flag hidden in an image, scan something to gain access to the flag.

QR-Code

Hint: Try resizing the images pixels, the creator may have intentionally hidden this, or mistakenly broke the code causing it not to show.

Challenge 19: Encrypted RAR File [Cyber II - Unit 1]

There is a flag hidden in an encrypted RAR file, brute force the password to get the flag. Username: jtruser Password: jtrpass. The RAR file is already on this user account use John The Ripper to decipher the password and then download and open it on your local machine using the password using 7zip or winRar to get your flag.

Hint: Try using a program like John The Ripper to brute force the password of the file. It may prompt you that google drive cant scan it for virus' there is no virus you can proceed. In other circumstances dont alway's trust files like this unless you know for sure its safe. Instead of running "john --show rar_hash.txt" as your command use "/opt/john/run/john --show rar_hash.txt" instead. This part is just an example "--show rar_hash.txt"

Challenge 20: Web Server Logs [Cyber II - Unit 1]

You have been given access to a server's logs. Analyze the logs to find a hidden flag. Pay attention to query parameters or unusual request patterns.

Hint: Flags are often stored in query parameters.

Challenge 21: PDF MetaData [Cyber II - Unit 1]

A PDF file is provided, and the flag is hidden in its metadata.

Hint: PDF metadata can sometimes include hidden fields like the document's creation date, modification date, or the identity of the user who created it. Look beyond the basic document info for unusual or hidden entries.

Challenge 22: Cookie Flags [Cyber I - Unit 2]

Click the button, doing so will create a cookie within your browser, find it and you will find your flag!

Hint: To solve this challenge, inspect the cookies set by the website. You can easily access them through your browser's developer tools. Once you find the cookie named user_flag, check its value carefully. The flag should be hidden inside the cookie, and it's usually formatted like flag{...}

Challenge 23: Caesar Cipher [Cyber I - Unit 3]

Decrypt the following text encrypted with a Caesar cipher (shift: 5):

Encrypted Text: agvb{xvznvm_kduuv}

Hint: Shift forward by 5 to reveal the flag.

Challenge 24: Vigenère Cipher [Cyber I - Unit 3]

Decrypt the ciphertext below to find the flag. Use the keyword provided in the hint.

Ciphertext: hjbk{makghvzx_atydovv}

Hint: The keyword is "cybersecurity".

Challenge 25: Hidden Directory

There is a hidden directory on the website containing the flag. Find it!

Hint: Try appending /hidden/flag.txt to the URL.

Challenge 26: MD5 Hash Cracking [Cyber I - Unit 3]

The flag has been hashed using the MD5 algorithm. Your task is to reverse the hash and find the original flag.

MD5 Hash:69dae97ef29303f177aeb7aa44b3b4f3

Hint: Use online tools or brute-force programs to reverse the hash. Try MD5Hashing.net

Challenge 27: SQL Injection Cracking [Cyber I - Unit 9]

The Flag has been hidden on a user account, use SQL Injections to try and extract information and login

Hint: Research common SQL injection queries for listing all username, email, other columns in the users table. Use the Search Box for Injection.

Challenge 28: SQL Injection List Databases [Cyber I - Unit 9]

The Flag has been hidden as a database name, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for listing all databases within a mySQL server.

Challenge 29: SQL Injection List MySQL Users [Cyber I - Unit 9]

The Flag has been hidden as a user in the MySQL program on the database server, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for listing all users within a mySQL server.

Challenge 30: SQL Injection List Database Columns [Cyber I - Unit 9]

The Flag has been hidden in a column on the database, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for listing all users within a mySQL server.

Challenge 31: SQL Injection Load a hidden table [Cyber I - Unit 10]

The flag has been hidden in a table inside the database, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for loading tables within a MySql Database.

Challenge 32: SQL Injection Load a File from the Linux System [Cyber I - Unit 10]

The flag has been hidden in a file outside of the database on the operating system, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for loading files outside of a MySql Database.

Challenge 33: SQL Injection Load a Stored Procedure from the Database [Cyber I - Unit 10]

The flag has been hidden as a name for a stored procedure inside of the database on the operating system, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for loading files outside of a MySql Database.

Challenge 34: SQL Injection Load a Stored Procedure Comment from the Database [Cyber I - Unit 10]

The flag has been hidden in a stored procedure comment inside of the database on the operating system, use SQL Injections to try and extract information to get your flag.

Hint: Pay close attention to the format of the results when forming your SQL injection. Research common SQL injection queries for loading files outside of a MySql Database.

Challenge 35: UNSECURE JSON [Cyber II - Unit 2]

The following JWT is signed with an insecure key. Manipulate it to gain admin access.

JWT:
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJjaGFsbGVuZ2UiOiJGaW5kIHRoZSBoaWRkZW4gZmxhZyIsImhpbnQiOiJMb29rIGF0IGFsbCB0aGUga2V5cyBjYXJlZnVsbHkiLCJkYXRhIjp7ImxldmVsIjoxLCJkZXNjcmlwdGlvbiI6IlRoaXMgaXMgYSBzaW1wbGUgSlNPTiBjaGFsbGVuZ2UiLCJmbGFnIjoiZmxhZ3toaWRkZW5faW5fanNvbn0ifSwiaWF0IjoxNzM3ODQxNjAwfQ.-scQPpWealIJHLHf9_BsUgANLshGo51_haYUFTGYOAY

Hint: Try cracking the JWT secret key using tools like jwt.io.

Challenge 36: Social Engineering Scammers [Cyber I - Unit 4]

The following is an example of a phishing email always inspect the actual email of the sender, never open any links, files, click buttons, etc.

Hint: Try deleting the email, or marking it as spam.

Challenge 37: Linux Shell in a Box [Cyber II - Unit 2]

Connect to the Linux VPS via Shell in a Box to retrieve the flag. Use ls to show your current active directory and then use cat to read or print out the flag to the console. USERNAME: weakuser PASSWORD: password123

Hint: Explore the file system. The flag is in a text file.

Challenge 38: Linux Shell in a Box Banner Leak

Connect to the Linux VPS via Shell in a Box to retrieve the flag.

Hint: Explore the file system. The flag is shown in a banner when connected.

Congratulations!

You have completed all challenges.

You can now send a stylized email with your results!

Your final score is:

0%