ctfd-app-femdr6csup5ky.azurewebsites.net
Open in
urlscan Pro
20.119.0.48
Public Scan
URL:
https://ctfd-app-femdr6csup5ky.azurewebsites.net/
Submission: On January 21 via api from US — Scanned from US
Submission: On January 21 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
* Terminal * Overview * Rules * Scoreboard * Challenges * Users * Teams * * Register * Sign in 1. OMG! Hacker 2. welcome back! * Terminal * Rules * Scoreboard * Challenges * Users * Teams * * Register * Sign in EVERY DAY LOTS OF WINS! 0XL4UGH CTF 24 Welcome to 0xL4ugh CTF 24 (Third Edition)! Brace yourself for a challenging, and gamified hands-on experience. Our carefully crafted challenges are inspired by real-life scenarios and research, ensuring a unique and enjoyable CTF journey. Join our Discord Why CTFs! Capture The Flags (CTF) is one of the best ways to get a feel for what cybersecurity is all about. Get Hired Looking for a new job in cybersecurity? Get your dream job by solving challenges in CTF events. Fun & Profit Earn cash prizes, or gift cards while having fun with your friends in a safe and legal environment. Everything Around Hacking Gain access to a safe and unique hands-on experience in a set of challenges from various domains of cybersecurity. The challenges are all set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience. prevnext stop animationstop slide 4 to 6 of 9 Machines Attack and defend computer networks are similar to those used by organizations today. Blockchain Hacking DeFi assets and smart contracts is the primary objective of this category. OSINT Gathering information from publicly available sources to catch bad actors or identify vulns. Pwn The skill of finding a vulnerability in a program and exploiting them to obtain a shell. Forensics The art of gathering, recovering, and analyzing digital evidence left on a computer. Web Exploiting vulnerabilities in web applications to takeover users' data or the app itself. Crypto The art of Breaking widely used encryption schemes that are improperly implemented. Hardware Take over control of the hardware, extract data, or cause it to misbehave or malfunction. Reversing The skill of dismantling computer software to see how it works or breaking its functionality. Machines Attack and defend computer networks are similar to those used by organizations today. Blockchain Hacking DeFi assets and smart contracts is the primary objective of this category. OSINT Gathering information from publicly available sources to catch bad actors or identify vulns. Pwn The skill of finding a vulnerability in a program and exploiting them to obtain a shell. Forensics The art of gathering, recovering, and analyzing digital evidence left on a computer. Web Exploiting vulnerabilities in web applications to takeover users' data or the app itself. CTF - Sponsors We extend our heartfelt gratitude to our esteemed sponsors for their generous support, making 0xL4ugh CTF 24 possible. Their commitment to cybersecurity excellence and passion for fostering a thriving community is instrumental in the success of our Capture The Flag competition. prevnext stop animationstop slide 6 to 8 of 5 CTF HOSTING * Basic Plan * Premium Plan CTF As A Service Are you looking for gamified hacking challenges that will enable your students or staff to compete in real-time with each other and advance their cybersecurity skills in action? Host a CTF for your team! Who will capture the flag first? CTF competitions are a great way to increase awareness and skill set across an organization, while also incorporating gamification into its teams’ cybersecurity training. University Stiff theory and exhaustive textbooks can sometimes make an academic cybersecurity curriculum too theoretical. What's included on Basic Unlimited users Live Support Event Branding Use Your Own Content Unique *.ctf.sd subdomain Content Testing & Integration Host a University CTF Business Host a private CTF for your company or build a public event for brand awareness with our world-class hosting service. What's included on Basic Unlimited users Live Support Event Branding Use Your Own Content Unique *.ctf.sd subdomain Content Testing & Integration Host a Business CTF CTF As A Service Are you looking for gamified hacking challenges that will enable your students or staff to compete in real-time with each other and advance their cybersecurity skills in action? Host a CTF for your team! Who will capture the flag first? CTF competitions are a great way to increase awareness and skill set across an organization, while also incorporating gamification into its teams’ cybersecurity training. University Stiff theory and exhaustive textbooks can sometimes make an academic cybersecurity curriculum too theoretical. What's included on Premium Entire Basic plan Host On-Site CTF Admin Dashboard Use Your Own Domain Custom-Coded Templates Custom Challenges Development Host a University CTF Business Host a private CTF for your company or build a public event for brand awareness with our world-class hosting service. What's included on Premium Entire Basic plan Host On-Site CTF Admin Dashboard Use Your Own Domain Custom-Coded Templates Custom Challenges Development Host a Business CTF CTF.sd © Sud0root 2024.