CAPTURE THE FLAG
HACK.SOLVE.WIN.
Join the competition to compete with the hackers around the world to solve complex security challenges and cryptographic puzzles in a race against time.
Next Challenge Begins In:
Challenge Categories
Put your skills to the test across multiple security domains. Each category offers challenges with varying difficulty levels.
Web Exploitation
Identify and exploit vulnerabilities in web applications to gain unauthorized access. Involves finding and exploiting vulnerabilities in web applications (e.g., SQL injection, XSS, insecure cookies) to gain unauthorized access or extract data.
Reverse Engineering
Analyze compiled programs to understand their functionality and find hidden flags. Analyzing compiled programs (usually binary files) to understand how they work, often without source code.
Cryptography
Decrypt messages, crack codes, and solve mathematical puzzles to reveal hidden information. Focuses on breaking or analyzing cryptographic algorithms to uncover hidden messages or flaws in implementation.
Forensics
Analyze digital evidence to uncover flags hidden in files, memory dumps, or network captures. Involves analyzing files, memory dumps, or network traffic to uncover hidden data.
Binary Exploitation
Exploit vulnerabilities in binary programs to gain control of program execution. Requires exploiting vulnerabilities in compiled binaries (e.g., buffer overflows) to take control of program execution.
General Skills
Focuses on fundamental knowledge like encoding, decoding, scripting, and basic file or data manipulation. Challenges often involve using Linux command-line tools, writing simple scripts, and working with various file types.
Challenge Rules
Challenges are worth varying points based on difficulty.
Flag format: heCTF{"flag"}
No sharing of flags or solutions during the competition.
DoS attacks against the platform are strictly prohibited.
Prizes & Rewards
Compete for glory, recognition, and substantial prizes that recognize your hacking prowess.
2nd Place
1st Place
3rd Place
Additional Prizes
CTF Merchandise for top 10 candidates
Event Timeline
Mark your calendar for these key dates and be ready to compete with the best.
Registration Opens
Reserve your spot in the competition.
Early registration includes access to practice challenges.
Challenge Begins
The competition launches.
Access to all challenges opens simultaneously worldwide.
Challenge Ends
The competition concludes.
Submission period will end simultaneously worldwide.
Winners Announcement
Winners are determined based on points and completion time.
The top three will receive prizes.
Interested in sponsoring this event.
Frequently Asked Questions
Find answers to common questions about the CTF challenge.
The challenge is open to everyone, from cybersecurity students to seasoned professionals. You can participate as an individual candidate only.
Participants should have basic knowledge in areas such as web exploitation, cryptography, reverse engineering, and forensics. Different challenges cater to different skill levels, from beginner to expert.
You can use any tools and resources at your disposal except for those that perform automated attacks against the competition infrastructure. Sharing flags or solutions with other teams is prohibited.
Each challenge is worth a specific number of points based on difficulty. The candidate with the highest score at the end wins. Ties are broken by the earliest submission time.
Yes, the CTF is entirely online. Participants from anywhere in the world can join as long as they have a stable internet connection.
After registration, you'll receive a confirmation email with details about the competition platform and how to access practice challenges.
No, participation is completely free.
Still have questions?