Skip to content

Categories

The CTF has many challenge categories and some learning material about those categories are provided here for your quick reference. CTF participants are expected to perform their own research.

  • Artificial Intellegence


    Artificial Intellegence (AI) is most commonly used when you are too lazy to do your own homework.

    Learn more

  • Cryptography


    These challenges serve to hide or uncover information that was intended for select persons to use or read.

    Learn more

  • Digital Forensics


    Also known as Computer Forensics (digital or cyber), these challenges serves to investigate techniques to identify or collect evidence. Evidence such as reviewing event logs to proactively identify bugs, security threats, or other risks.

    Learn more

  • GRC


    Known as Governance, Risk, and Compliance that aims to focus on aligning business efforts with Cybersecurity.

    Learn more

  • OSINT


    These challenges serve to use Open Source Intelligence (OSINT) through the use of online resources to gather information and find the flag.

    Learn more

  • Password Cracking


    Password cracking involves using techniques and tools to gain unauthorized access to systems by deciphering or bypassing password protections.

    Learn more

  • Privacy


    Your digital footprint will be the death of you. Don't get cyberbullied.

    Learn more

  • Reverse Engineering


    Reverse engineering challenges often involve dissecting complex systems to understand their inner workings, which requires both technical expertise and creativity to uncover hidden functionalities or vulnerabilities. You will also take advantage of bugs or vulnerabilities to cause unintended behavior of a program.

    Learn more

  • Security Awareness


    These challenges serve to educate and test knowledge of Cybersecurity practices of participants.

    Learn more

  • Social Engineering


    These challenges serve to simulate social engineering campaigns that have been used in real life but shouldn't be done to others.

    Learn more

  • Web Exploitation


    These challenges serve to exploit vulnerabilities in web applications.

    Learn more

  • Physical Injects


    Physical interactive challenges that can only be done in person.

    Learn more

  • 🧑‍🎓 Participant Created


    Challenges that have been created by CyberStrike participants and modified to be used in competitions. Participants who create and submit challenges may receive bonus points during the next competition and see if you can stump other competitors.

    Submit a challenge

Info

Challenge Categories such as Physical Injects and Artificial Intellegence requires a live response during the CTF event. Live responses are submitted into your teams Discord channel and CTF Staff will review the submitted response to give points accordingly.