Break codes, decrypt messages, and solve encryption puzzles.
Find correlations with secret data.
Challenge yourself on the chip.
Investigate digital evidence to uncover crucial information.
Analyze and understand code to find hidden secrets.
Find and exploit vulnerabilities in executable programs.
«Search, Scan, Exploit» in a realistic scenario.
Identify and exploit vulnerabilities in web applications.
Special challenges that don't fit traditional categories.
Test your skills in finding open-source information.
How good are you at programming?
The system boots. The terminal blinks. Somewhere deep within the infrastructure, digital Easter eggs have been concealed, each one hiding a flag, a secret, or a key to the next layer of the network.
Traces have been left across every protocol, every port, and every service. Your mission is to track them down, exploit the flaws, and secure the data before the clock runs out.
Assemble a 5-player team to tackle a wide range of cybersecurity challenges across multiple categories. Our environment is designed for all skill levels, from newcomers to seasoned netrunners. Each category offers progressively difficult tasks worth varying points.
// READY TO CRACK THE SYSTEM?
REGISTER NOW