Break codes, decrypt messages, and solve encryption puzzles.
Find correlations with secret data.
Challenge yourself on the chip.
Investigate digital evidence to uncover crucial information.
Analyze and understand code to find hidden secrets.
Find and exploit vulnerabilities in executable programs.
«Search, Scan, Exploit» in a realistic scenario.
Identify and exploit vulnerabilities in web applications.
Special challenges that don't fit traditional categories.
Test your skills in finding open-source information.
How good are you at programming?
[CONFIDENTIAL]
The door opens and you step into this old room that shaped your childhood. Lots of consoles and computers are lying around and haven't moved a millimeter since the last time you used them. It feels just like yesterday. You take one of them and press the start button; the screen displays a blinking text you've known for a long time. But times have changed. The machine starts to shake in your hands and, in a flash, you're instantly teleported somewhere else. Dive into the Grid, and if you're strong enough, escape the virtual world and beat the sandbox built by the Master Computer!
Build a 5-player team to tackle a wide range of cybersecurity challenges across multiple categories. Our challenges are designed for all skill levels, from newcomers to netrunners. Each category offers progressively difficult tasks worth varying points.
Ready ?
REGISTER NOW