- The largest high school hacking competition now provides year-round cyber security education content for learners of all skill levels.
- Participants learn to overcome sets of challenges from six domains of cybersecurity including general skills, cryptography, web exploitation, forensics, etc. The challenges are all set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience.
Requirements :
- Operating Systems like [Kali linux , Parrot OS , etc …]
- Normal performance laptop like (Ram : 4GB , Storage : 50GB , )
Knowledge Need and Improved :
- Cyptography
- Web Technologies
- Networks
- Binary Exploitaions
- Reverse Engneering
- Stegnography
- OSINT
- Linux
Questions
General Skills
| Question | Points |
|---------------------------------------------------------------------------------|--------|
| [Obedient Cat](./General_Skill/01.Obedient%20Cat) | 5 |
| [Python Wrangling](./General_Skill/02.Python%20Wrangling) | 10 |
| [Wave a flag](./General_Skill/03.%20Wave%20a%20flag) | 10 |
| [Nice netcat...](./General_Skill/04.%20Nice%20netcat) | 15 |
| [Static ain't always noise](./General_Skill/05.Static%20ain't%20always%20noise) | 20 |
| [Tab, Tab, Attack](./General_Skill/06%20.Tab,%20Tab,%20Attack) | 20 |
| [Magikarp Ground Mission](./General_Skill/07.Magikarp%20Ground%20Mission) | 30 |
| [Lets Warm Up](./General_Skill/08.Lets%20Warm%20Up) | 50 |
| [Warmed Up](./General_Skill/09.Warmed%20Up) | 50 |
| [2Warm](./General_Skill/10.2Warm) | 50 |
Cryptography
| Question | Points |
|---------------------------------------------------------------------------------|--------|
| [Mod 26](./Crypto/1%20.%20Mod%2026/README.md) | 10 |
Web Exploitation
| Question | Points |
|--------------------------------------------------------------------------|--------|
| [GET aHEAD](./Web/1%20.%20GET%20aHEAD) | 20 |
| [Cookies](./Web/2%20.%20Cookies) | 40 |
| [Insp3ct0r](./Web/3%20.%20Insp3ct0r) | 50 |
| [Scavenger Hunt](./Web/4.Scavenger%20Hunt) | 50 |
| [Some Assembly Required 1](./Web/5%20.%20Some%20Assembly%20Required%201) | 70 |
| [More Cookies](./Web/6%20.%20More%20Cookies) | 90 |
| [where are the robots](./Web/7%20.where%20are%20the%20robots) | 100 |
Forensics
| Question | Points |
|--------------------------------------------------------------------------------|--------|
| [information](./Forensic/01.Information) | 10 |
| [Matryoshka doll](./Forensic/02%20.%20Matryoshka%20doll) | 30 |
| [tunn3l v1s10n](./Forensic/03.tunn3l%20v1s10n) | 40 |
| [Glory of the Garden](./Forensic/04.Glory%20of%20the%20Garden) | 50 |
| [Wireshark doo dooo do doo...](.Forensic/05.Wireshark%20doo%20dooo%20do%20doo) | 50 |
| [More Cookies](./Web/6%20.%20More%20Cookies) | 90 |
| [where are the robots](./Web/7%20.where%20are%20the%20robots) | 100 |
Reverse Engineering
| Question | Points |
|----------------------------------------------------------|--------|
| [Transformation](./Rev/1%20.%20Transformation/README.md) | 20 |
| [keygenme-py](./Rev/2%20.%20keygenme-py/README.md) | 30 |
| [crackme-py](./Rev/3%20.%20crackme-py/README.md) | 30 |
| [ARMssembly 0](./Rev/4%20.%20ARMssembly%200/README.md) | 50 |
Binary Exploitation
| Question | Points |
|----------|--------|
CTF Knowledge