Crypto
Misc
A local hacker, TheITFirefly, who started up a blog to talk about his exploits in the tech world, has hidden a flag in the source code for his blog. Luckily, his source code is publicly available in a git repo!
Social engineering CTF challenges are tough to create! Fortunately, my friend Greg agreed to help give you some practice. Ever since we were kids, he's used the same password for everything, and your job is to get it from him.
Can you exploit the issues in my Machine Learning Model?
I wonder where the sanity check flag is.... anyways, make sure you check out the rules before you start!
Please fill out the feedback survey!
IoT
OSINT
Within the folds of memory, a photograph holds the key to an address now obscured by time's veil. Yet, in this image lies the path to a vital correspondence. With your aid, let us decode the hidden coordinates within to ensure our message reaches its intended destination at the post office.
When does the registration on this car expire?
During my recent escapade into the azure embrace of vacation bliss, amidst the sun-kissed shores and cerulean waves, there emerged a majestic vessel that captured the essence of maritime splendor. Alas, its name eludes the grasp of my memory, a fleeting whisper lost in the sea breeze.
Uh oh! A popular social media site may be the victim of typosquatting. The social media owners might want to fix that so their users don't accidentally go to the wrong site. When does the registration for the facebooks.com domain expire? Maybe after it expires, the real company could take control...
Reversing
Forensics
We have a Word file placed on one of our machines by a cyber attacker. Who is the author of the document?
The Mad Cow APT has been responsible for a significant amount of attacks against organizations in the technology, finance, and energy domains. They first started their attacks around 3 years ago, though they have been dormant in the last 2 years. Recently, the APT started to resurface.
Hello there!
Pwn