Preview Mode
Log in to submit flags and track your progress. Your solves will be saved!
AI Optimizer
practice
An opaque decision engine can be persuaded to reveal its inner logic if you understand how it thinks.
Prescription Pad
practice
An e-prescription system was pulled from a telehealth platform after reports that unauthorized prescriptions were being issued. Forensics recovered the authorization binary, but the validation logic is unlike anything the analysts have seen — the decompiler output is useless. Something else is running inside this binary. Figure out what it's checking.
Satellite Uplink
practice
A custom communication protocol stands between you and privileged access to an orbital system.
Chemical Plant
practice
Encrypted industrial commands reveal patterns that can be turned against the system itself.
Genome LCG Oracle
practice
Attack a Linear Congruential Generator used to seed genome sequencing tokens.
Clinical Gateway SSRF
practice
Exploit SSRF in a clinical data gateway to pivot to internal healthcare services.
AI Triage Jailbreak
practice
Bypass AI-powered triage safety filters to extract sensitive patient data.
Bio-Lab Airlock
practice
A high-security database won’t reveal its secrets directly, but it reacts just enough to careful probing.
Health Data NoSQL
practice
Exploit NoSQL injection in a health data API to enumerate patient records.
Smart City Grid
practice
A debugging feature meant for engineers quietly weakens the system’s core trust mechanism.
IoT Dashboard
practice
A smart city interface struggles to agree on which device it’s actually talking to.
Vital Signs
practice
A medical device manufacturer distributed a firmware validation tool to hospital IT departments. The tool checks a maintenance passphrase before granting access to ventilator diagnostics. A security researcher flagged that the authentication logic looks custom-built rather than using standard cryptographic libraries. Recover the passphrase.
Encrypted Audit Logs
practice
Decrypt tampered audit log entries to reconstruct evidence of unauthorized access.
Drone Flight Path
practice
An autonomous system trusts user input a little too much, with consequences for who’s really in control.
Patient Zero
practice
A rural clinic's patient records were encrypted before transmission to the regional health authority. The encryption was implemented by a volunteer developer who prioritized speed over security. We have the public key and one encrypted record. Recover the contents before the outbreak response window closes.
Pharmacy XOR Oracle
practice
Recover plaintext prescription data by exploiting a reused-key XOR cipher.
Factory Maintenance
practice
A neglected industrial control panel exposes more than it should to anyone who knows how to speak to it properly.
Patient Portal Leak
practice
Discover an insecure direct object reference leaking patient portal records.
EHR Parameter Pollution
practice
Use HTTP parameter pollution to bypass access controls in an electronic health record system.
Legacy Modem
practice
An outdated piece of infrastructure still remembers how it was first set up, and it never forgot its secrets.
Wellness Bot Injection
practice
Inject commands into a wellness chatbot to exfiltrate internal configuration.
Dosage Calculator Overflow
practice
Trigger an integer overflow in a medical dosage calculator to uncover hidden functionality.
Supply Chain Map
practice
A logistics dashboard tells a clean public story, but the real picture is hiding just beneath the surface.
Vaccine Cold Chain
practice
Analyze temperature sensor data to identify a break in the vaccine cold chain.
Learn at Your Pace
No time limits. Take as long as you need to solve each challenge.
Track Progress
Your solved challenges are saved. Come back anytime to continue.
SDG Aligned
Each challenge connects to a UN Sustainable Development Goal.