Cyber Security Lab

Practice challenges

CTF is a Capture The Flag (CTF) style of cyber security competition. Use the links below to explore our archive of practice challenges.

Cryptography

Escape the Link

Easy

While investigating a phishing attempt, you stumble upon a suspicious

Hidden in Plain Touch

Easy

During an audit of a secure facility, you discover a

The Careless Spy

Medium

A spy working for a rival organization tried to send

Simple Substitution

Easy

While monitoring communications, you found a suspicious note. It looks

Climbing

Easy

The flag has been encrypted with a climbing key. Decrypt

Encoded

Easy

Encoded The flag is encoded, but not encrypted, in the

OSINT

The Insider’s Trail

Easy

Security team has noticed suspicious social media chatter about an

Reverse Engineering

Puzzle Box

Medium

A curious developer left a program called puzzle_box on your

Secret Decoder

Easy

A software engineer left a “secret decoder” program on an

Magic Calculator

Easy

You stumble upon a small program called magic_calc. It claims

Crack The Lock

Easy

You found a small executable program labeled lockbox. It appears

Steganography

Audio Spectrogram

Easy

You received an intercepted audio recording that seems ordinary at

Web Exploits