JinjaCare
Solutions As you can see the title of the challenge, we will notice that this challenge is about SSTI, so let try ${7*'7'}} in any input form. But first, we need to register account. In Personal...
Solutions As you can see the title of the challenge, we will notice that this challenge is about SSTI, so let try ${7*'7'}} in any input form. But first, we need to register account. In Personal...

CHALLENGE DESCRIPTION Your boss is concerned about Volt Typhoon and some of their malware developments. He has requested that you obtain a copy of the associated malware and conduct a static analys...
DESCRIPTION A firmware update to a regional power grid controller was intercepted hours after the breach containment at the edge router. Task Force Phoenix believes this is the next phase of Opera...
DESCRIPTION Using credentials flagged in the previous investigation, Volnayan APTs have successfully breached a critical internal router. Telemetry from the affected systems indicates active latera...
DESCRIPTION After successfully leveraging a weak PIN system to access a critical internal server, you’ve infiltrated CygnusCorp’s network. Your next objective is clear: pivot laterally toward the ...
DESCRIPTION Following intel extracted from suspicious TOR traffic during Operation Blackout, you’ve uncovered a dump of leaked credentials linked to strategic user accounts. Advanced Persistent Thr...
DESCRIPTION After analyzing CygnusCorp’s leaked credentials, you successfully infiltrate a secondary layer of their internal network. During your investigation, you discover developer credentials t...
DESCRIPTION Welcome to the SudoKing challenge! In this task, your objective is to write a program that solves a given Sudoku puzzle. Challenge Description: You will receive an incomplete Sudoku p...
DESCRIPTION We’ve intercepted codes from an underground organisation with intentions of malicious activity. Intelligence has informed us that most of the numbers are garbage, but the biggest and sm...
DESCRIPTION During a red team engagement against CygnusCorp, your team gained access to a third-party analytics platform that had been improperly secured. This system — used for employee behavior p...