ctfd-app-femdr6csup5ky.azurewebsites.net Open in urlscan Pro
20.119.0.48  Public Scan

URL: https://ctfd-app-femdr6csup5ky.azurewebsites.net/
Submission: On January 21 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

 * Terminal
   * Overview
 * Rules
 * Scoreboard
 * Challenges
 * Users
 * Teams
 * 
 * Register
 * Sign in

 1. OMG! Hacker
 2. welcome back!

 * Terminal
 * Rules
 * Scoreboard
 * Challenges
 * Users
 * Teams
 * 
 * Register
 * Sign in

EVERY DAY LOTS OF WINS!


0XL4UGH CTF 24

Welcome to 0xL4ugh CTF 24 (Third Edition)! Brace yourself for a challenging, and
gamified hands-on experience. Our carefully crafted challenges are inspired by
real-life scenarios and research, ensuring a unique and enjoyable CTF journey.
Join our Discord

Why CTFs!
Capture The Flags (CTF) is one of the best ways to get a feel for what
cybersecurity is all about.
Get Hired
Looking for a new job in cybersecurity? Get your dream job by solving challenges
in CTF events.
Fun & Profit
Earn cash prizes, or gift cards while having fun with your friends in a safe and
legal environment.

Everything Around Hacking
Gain access to a safe and unique hands-on experience in a set of challenges from
various domains of cybersecurity. The challenges are all set up with the intent
of being hacked, making it an excellent, legal way to get hands-on experience.
prevnext

stop animationstop
slide 4 to 6 of 9
Machines
Attack and defend computer networks are similar to those used by organizations
today.
Blockchain
Hacking DeFi assets and smart contracts is the primary objective of this
category.
OSINT
Gathering information from publicly available sources to catch bad actors or
identify vulns.
Pwn
The skill of finding a vulnerability in a program and exploiting them to obtain
a shell.
Forensics
The art of gathering, recovering, and analyzing digital evidence left on a
computer.
Web
Exploiting vulnerabilities in web applications to takeover users' data or the
app itself.
Crypto
The art of Breaking widely used encryption schemes that are improperly
implemented.
Hardware
Take over control of the hardware, extract data, or cause it to misbehave or
malfunction.
Reversing
The skill of dismantling computer software to see how it works or breaking its
functionality.
Machines
Attack and defend computer networks are similar to those used by organizations
today.
Blockchain
Hacking DeFi assets and smart contracts is the primary objective of this
category.
OSINT
Gathering information from publicly available sources to catch bad actors or
identify vulns.
Pwn
The skill of finding a vulnerability in a program and exploiting them to obtain
a shell.
Forensics
The art of gathering, recovering, and analyzing digital evidence left on a
computer.
Web
Exploiting vulnerabilities in web applications to takeover users' data or the
app itself.
CTF - Sponsors
We extend our heartfelt gratitude to our esteemed sponsors for their generous
support, making 0xL4ugh CTF 24 possible. Their commitment to cybersecurity
excellence and passion for fostering a thriving community is instrumental in the
success of our Capture The Flag competition.
prevnext

stop animationstop
slide 6 to 8 of 5



CTF HOSTING

 * Basic Plan
 * Premium Plan

CTF As A Service

Are you looking for gamified hacking challenges that will enable your students
or staff to compete in real-time with each other and advance their cybersecurity
skills in action? Host a CTF for your team! Who will capture the flag first?

CTF competitions are a great way to increase awareness and skill set across an
organization, while also incorporating gamification into its teams’
cybersecurity training.

University
Stiff theory and exhaustive textbooks can sometimes make an academic
cybersecurity curriculum too theoretical.
What's included on Basic

Unlimited users Live Support Event Branding Use Your Own Content Unique *.ctf.sd
subdomain Content Testing & Integration

Host a University CTF
Business
Host a private CTF for your company or build a public event for brand awareness
with our world-class hosting service.
What's included on Basic

Unlimited users Live Support Event Branding Use Your Own Content Unique *.ctf.sd
subdomain Content Testing & Integration

Host a Business CTF
CTF As A Service

Are you looking for gamified hacking challenges that will enable your students
or staff to compete in real-time with each other and advance their cybersecurity
skills in action? Host a CTF for your team! Who will capture the flag first?

CTF competitions are a great way to increase awareness and skill set across an
organization, while also incorporating gamification into its teams’
cybersecurity training.

University
Stiff theory and exhaustive textbooks can sometimes make an academic
cybersecurity curriculum too theoretical.
What's included on Premium

Entire Basic plan Host On-Site CTF Admin Dashboard Use Your Own Domain
Custom-Coded Templates Custom Challenges Development

Host a University CTF
Business
Host a private CTF for your company or build a public event for brand awareness
with our world-class hosting service.
What's included on Premium

Entire Basic plan Host On-Site CTF Admin Dashboard Use Your Own Domain
Custom-Coded Templates Custom Challenges Development

Host a Business CTF
CTF.sd © Sud0root 2024.