Four Easy Capture-The-Flag Challenges

PentesterLab
PentesterLab
Published in
2 min readOct 27, 2019

--

When building a Capture-The-Flag (for a conference), you need to have a good mix of very easy challenges and very hard challenges. You need to get people playing for the first time some easy wins to encourage them to dig deeper but you also need to keep the hardcore teams busy for a while.

In this post, I will share four examples of simple challenges created for the amazing conference Christchurch Con (kudos to the organisers for putting together such a great con). These challenges are by design very simple and you can adapt them for your CTF for a conference or just to have fun at work. One of these challenges was the most often solved challenges during the conference.

Challenge 1

To host this challenge, you just need a simple web server. When you visit the page, you can see the following:

Challenge 1: It Works!

The source code of the page gives up the flag pretty quickly:

index.html

The code above is just an embedded SVG with the flag behind a black rectangle.

Challenge 2

The second challenge was very similar but with a PDF this time, you can find the code to generate it below:

Script used to generate the PDF

Challenge 3

In this challenge, an image with the flag is created and split in 10 slices (shredded):

Challenge3.rb

Challenge 4

In this challenge, we do something similar but then we randomly mix the slices (I wrote a similar challenge for Ruxcon a few years back):

You now have 4 challenges you can use for your CTF (or modify to improve them). Have fun!

--

--

PentesterLab provides online exercises to learn web penetration testing. You can learn more about PentesterLab by visiting https://pentesterlab.com/