Pwn
Before we start, practice time!
HALT! Recognition protocol initiated. Please present your face for scanning.
Your gaze locks onto cryptic markings adorning the nearby wall.
Prepare for the ultimate showdown! Load your weapons, gear up for battle!
Crypto
A disturbing image of a Roman emperor drawn in blood.
As you grab a hold and pull it out, you realise it's a long stick.
Surrounded by an untamed forest and the serene waters of the Primus river.
Locked within a cabin crafted entirely from ice, you're enveloped in a chilling silence.
Lying there is a knife - damaged and blunt, but a knife nonetheless.
You find yourself in a labyrinthine expanse where movement is restricted to forward paths only.
Reversing
There's just one problem - the box is made of solid steel!
To escape the arena's latest trap, you'll need to get into a secure vault.
A giant stash of powerful weapons and gear have been dropped into the arena.
You must navigate the depths, barely able to see the ground beyond your feet.
Forensics
The Fray is upon us, and the very first challenge has been released!
We managed to extract the SSH Logs and the Bash History from our dev server in question.
As they decode the email, cyber sleuths race to trace its source, under a tight deadline.
To get the flag, you need to answer the questions from the docker instance.
We need to understand which data has been obtained from this attack.
In the bustling city of KORP™, where factions vie in The Fray, a mysterious game emerges.
Through data and bytes, the sleuth seeks the sign, decrypting messages, crossing the line.
The Fray is upon us, and the very first challenge has been released!
Misc
Security through Induced Boredom is a personal favourite approach of mine.
The Video Game is one of the greatest hits of the last...
I dare you to try and break free, but beware, it won't be easy.
Blockchain
This is a warm-up to test if you have what it takes to tackle the challenges of the realm.
The Fray announced the placement of a faucet along the path.
Hardware
Now, it's finally time to analyze the printer's filesystem. What can you find?
Upon arriving at the factory, you scan the networks and come across a RabbitMQ instance.
Upon reaching the factory door, you physically open the RFID lock and find a flash memory chip inside.
They're controlled by a small 8-bit computer equipped with AT28C16 as its control unit.