Support 🆘

In computer security, a 'Capture The Flag' (CTF) is a game where competitors need to hack into a purposefully-vulnerable machine or to solve a specific challenge in order to steal the flags from it. The flags are secrets hidden in files or in memory and they are located on the targeted system.

The CTF games have 2 main modes :

Attack/Defense scenario : each team is given a machine (or a small network) to defend or to attack. Teams are scored on both their success in defending their assigned machine(s) and on their success in attacking the other team's machines.

Jeopardy style : play it solo or in a team where each individual can score points by retrieving flags.

A challenge is an exercice aimed at studying a specific IT security subcategory such as Application security, Cryptography, Reverse Engineering, Forensics and many more.

For example, in the Web hacking category, each challenge focuses on a specific web applications vulnerability (SQL injections, XSS, CSRF, IDOR...)

Players must find the one and only flag in a challenge to score the points.

Each challenge has the following flag format :

FLAG{the_flag_to_submit} where 'the_flag_to_submit' is the actual flag to submit on our platform.