CTF (Bug Bounty Style)

Traditional CTFs: Players solve puzzles (crypto, reverse engineering, web exploitation, etc.) in a controlled environment.

Bug Bounty style CTFs: Instead of contrived puzzles, participants hunt for realistic vulnerabilities in intentionally vulnerable applications, mimicking how bug bounty hunters work.

Goal

Flags

There are various flags hidden in the target app. Same flag can be captured by exploiting different vulnerabilities. Capture the flag and write a report (detailed steps to reproduce).

Score

For each captured flag, the score will be awarded based on the technique of identifying the flag by validating the steps to reproduce.

Reward

Top 3 position holders will be rewarded.

Benefits
  • Real-world practice for aspiring bug bounty hunters.

  • Teaches responsible disclosure workflows.

Event Details

We partner with educational organizations and conduct CTF. Follow us on LinkedIn for details about upcoming CTF events.