CHALLENGES

CRYPTOGRAPHY

Break codes, decrypt messages, and solve encryption puzzles.

SIDE CHANNEL

Find correlations with secret data.

HARDWARE

Challenge yourself on the chip.

FORENSICS

Investigate digital evidence to uncover crucial information.

REVERSE

Analyze and understand code to find hidden secrets.

PWN

Find and exploit vulnerabilities in executable programs.

PENTEST

«Search, Scan, Exploit» in a realistic scenario.

WEB

Identify and exploit vulnerabilities in web applications.

MISC

Special challenges that don't fit traditional categories.

OSINT

Test your skills in finding open-source information.

SCRIPTING

How good are you at programming?

INITIALIZING THE HUNT

The system boots. The terminal blinks. Somewhere deep within the infrastructure, digital Easter eggs have been concealed, each one hiding a flag, a secret, or a key to the next layer of the network.

Traces have been left across every protocol, every port, and every service. Your mission is to track them down, exploit the flaws, and secure the data before the clock runs out.

AMSI CTF Challenge

Assemble a 5-player team to tackle a wide range of cybersecurity challenges across multiple categories. Our environment is designed for all skill levels, from newcomers to seasoned netrunners. Each category offers progressively difficult tasks worth varying points.

// READY TO CRACK THE SYSTEM?

REGISTER NOW