Hack the CTF
  • 🚩Welcome to Hack the CTF
  • Getting Started
    • ⭐Course Overview
    • ❓Why We Made This Course
    • 🔷Why CTFs are Important
    • Types of CTFs
    • Interesting CTF Info
  • Basics
    • Flag Format
    • Challenge Types (chals)
    • ✨Misc Terms & Rules
    • Tools and Methods
    • 🎮Let's Play
  • The Challenges
    • 🤔Learn, Hints, Solutions
    • 🟩EASY CHALS
      • 🟩Flag on a Function
      • 🟩Binary
      • 🟩Find and Watch
      • 🟩Lots of Them
      • 🟩Who Said This?
      • 🟩Click This Link
      • 🟩Remote Connect
      • 🟩Beeps and Beeps
      • 🟩Someone Not Use HTTPS
      • 🟩Cipher
      • 🟩Find Someone
      • 🟩CTF Page #2
      • 🟩Too Much Blue
    • 🟨MEDIUM CHALS
      • 🟨Hiding Right in Front of You
      • 🟨Base64 is the Answer
      • 🟨Hash of the Server IP Address
      • 🟨Query String
      • 🟨Literally in the Picture
      • 🟨Find the Texty Record
      • 🟨Where in the git is the Flag?
      • 🟨Websockets Delivery
      • 🟨Hacker Hid a File
      • 🟨I Hear Something
      • 🟨Where Am I?
      • 🟨Shakespeare is Hiding Something
      • 🟨CTF Page
    • 🟥HARD CHALS
      • 🟥Image Doesn't Work
      • 🟥Where is it?
      • 🟥Code Breaker
      • 🟥TV - Amateur Radio Way
  • Extra Resources
    • Where to Find More CTFs
  • Conclusion
    • Course Recap
    • 📝Quiz
    • 🦉Keep on Learning
  • SouthHills Info Request
Powered by GitBook
On this page
  1. Basics

Challenge Types (chals)

These are by no means the only categories, but the following are very common in CTF challenges.

Name
About

Cryptography

Code breaking secrets hidden in numbers and symbols

Reverse Engineering

Figure out how things work, then break those things!

Pwn

Finding vulnerabilities to exploit and gain control

Forensics

Investigate PCAPs, metadata, and memory to get the full story

Web

The attack surface of the modern world!

Misc

Weird jails, weird languages and more

OSINT

Find stuff from publicly available info

PreviousFlag FormatNextMisc Terms & Rules

Last updated 5 months ago