Welcome!
Jump to a section that you would like to learn more about and then try the challenges in each section. Answers will be posted below each section.
See Categories →Jump to a section that you would like to learn more about and then try the challenges in each section. Answers will be posted below each section.
See Categories →Use publicly available information collected from search engines, social media, databases, and more to answer challenges regarding a variety of topics.
Identify a variety of techniques used to encrypt or hide messages and extract their hidden messages.
Identify how computers store user passwords and the many pros and cons of a variety of different algorithms in use.
Identify the different types of network traffic and determine what was being sent between different computers over a network.
Identify between normal and abnormal operation based on logs generated by programs.
Use specialized tools to gain more information about a target, such as programs running on the target and potential vulnerabilities.
Analyze and recover digital evidence from a computer-related incident.
Also called enumeration and exploitation, identify exploits and vulnerabilites of code to bypass security measures in the code.
Identify exploits and vulnerabilities to bypass security measures of web applications.