Description:
You're a Pentester at Hackevil Solutions and has been tasked with leading a black box pentest for the company. During your reconnaissance phase, you discovered a potential vulnerability that led you to a zip file. Can you find the secrets of the universe?
Description:
Shathra the curious wanderer stumbled upon a hidden library filled with government archives. There, she discovered an enigmatic image, but unable to decipher its meaning, she sought the help of her tech-savvy friend, Svar. As Svar, it's up to you to use your leet skills to unravel the hidden message and report back to your adventurous friend Shathra before it's too late.
Description:
Walking is a simple yet effective way to improve your health. Not only is it a great form of low-impact exercise that can prevent witches from hexing you, but it can also make you touch grass. Go ahead, Take a walk!
Alright, pay attention. So, my buddy Ceaser bursts into the room, all hyped up, and starts blabbering about how he's come up with the most secure encryption algorithm ever. I mean, who has the time or the expertise to dive into that stuff, right? But here's where you come in. need you, my friend, I really do.
I managed to get his encryption algorithm. I overheard him say that it doesn't encrypt Numbers and special characters except brackets. Break it for me!
Intelligence has discovered that insurgents are using VoIP softphones to communicate. Our spy, Bob, has intercepted one of the leader's calls. This could potentially lead to uncovering their next attack. Find out what the insurgents are planning.
Caesar McDonald wasn't too thrilled when you managed to crack his code. But now he's come up with a brand new encryption algorithm, and rumor has it that his friend Freddy gave it a solid pentest.
Looking for answers? Look no further! Crush search, the ultimate Crush-search engine , is here to help. Just type in your crush's name and discover a world of information at your fingertips, even the phone number!. Fast, reliable, and easy to use, Don't waste time, start Crushing today!
Note: You're encouraged to exploit the flaw manually.
Pipeline Inc. believes that a rapid CI/CD pipeline is the key to a successful technology corporation. In fact, they are so committed to this concept that they named their company after it.
Employees in the Calcutta shaving company has been receiving a lot of suspicious phishing email's lately.
Although the Employees has been made aware, DevOps manager and part time Fishing Enthusiast Jyll had fallen pray to the phishing campaign.
Jyll's desktop was infected with an unknown malware, and the security team is concerned that confidential data may have been compromised.
As a part of the Incident response team, You've been tasked with Identifying the threat actor and analyse the situation.
Things are not going well at the Calcutta Shaving Company (CSC™). They are under constant attack, and this time, the Wheelbarrow, a café owned by CSC™, has been hit.
There are doubts as to whether the attackers have already broken in. The company is deeply impressed by your previous work and wishes for you to conduct an investigation.
Welcome, Agent 47, the vault has been located, It's up to you to take it from here.
Note: Submit the MD5 of the retrieved secret as flag, wrap the MD5 with rctf{} Example:If the secret is "s3c>r3t" submit in format rctf{md5("sec>r3t")}