Crypto
The Cryptography category often features ciphertexts, cryptographic algorithms, or cryptographic systems which involve several encryption and decryption protocols used to uncover hidden messages or vulnerabilities.
A list of CTF categories from past instances of Kybersoutěž and similar competitions.
The Cryptography category often features ciphertexts, cryptographic algorithms, or cryptographic systems which involve several encryption and decryption protocols used to uncover hidden messages or vulnerabilities.
Many challenges in CTFs will be completely random and unprecedented, requiring simply logic, knowledge, and patience to be solved.
The Exploitation category often features compiled programs which have a vulnerability allowing a competitor to gain a command shell on the server running the vulnerable program.
This often has the user exercising reverse engineering skills as well.
The Reverse Engineering category often features programs from all operating systems which must be reverse engineered to determine how the program operates.
Typically the goal is to get the application to reach a certain point or perform some action in order to achieve a solution.
The Web Security category often features custom developed web applications which include some web security flaw which must be identified and exploited.