Week 1 T&L Activities:

Network Ownership

A suspicious login originated from IP address '1.1.1.1'. Identify the Autonomous System (AS) organization that owns this IP address. Please use lower case for the answer.

50points

Hint :Use an IP lookup or BGP/ASN lookup tool.

Hint: Look for the 'AS Organization' field.

Hnt: The flag format is FLAG{organization_name}.


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 2 T&L Activities:

DNS Infrastructure

Description

Investigate the domain 'iana.org'. Identify one of its authoritative name servers (NS record). Extract only the hostname before the first dot.

Links


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 3 T&L Activities:

Email Authentication

Description

Investigate the domain 'google.com'. Identify the mechanism used in its SPF record that authorizes sending mail.

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 4 T&L Activities:

Reverse Lookup

Description

Perform a reverse DNS lookup on the IP address '8.8.8.8'. Identify the primary hostname associated with this IP.


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 5 T&L Activities:

Metadata Trail

Description

An image shared by a threat actor contains specific file permissions in its EXIF metadata. Extract the specific file permissions, make sure to include every '-' in the answer.

Links

or 

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 6 T&L Activities:

Open Source License

Description

Investigate the GitHub repository 'torvalds/linux'. Identify the license used by the project. Note that case-sensitivity matters.

Links

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 7 T&L Activities:

Breach Exposure

Description

An employee's email address '[email protected]' may have appeared in a data breach. Use Have I Been Pwned to investigate. Identify the first listed breach. Use lowercase in the flag.

Links

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 8 T&L Activities:

Malware Behaviour Analysis

Description

Search the hash '44d88612fea8a8f36de82e1278abb02f' on VirusTotal. Identify the file type detected.

Links

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 9 T&L Activities:

Archived Source Inspection

Description

Use the Wayback Machine to locate the earliest available archived snapshot of 'https://www.offensive-security.com'. Open that snapshot and inspect the HTML source of the archived page itself (not the Wayback interface). Within the page’s HEADER section, identify the first word of the first paragraph contained there. The answer is case-sensitive.

Links

200 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 10 T&L Activities:

Authoritative Source

Description

Investigate the domain 'iana.org'. Identify the primary nameserver listed in its SOA (Start of Authority) DNS record.

Links

 

200 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 11 T&L Activities:

ROT13 Warm-Up

Description

ROT13 is a simple letter substitution cipher that replaces a letter with the 13th letter after it in the alphabet. Your task: Decode the following message: ebg13_vf_rnfl

 

Links

30 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 12 T&L Activities:

Base64 Basics

Description

Base64 is a common encoding scheme used to represent binary data in ASCII text. Your task: Decode the following string: YmFzZTY0X2RlY29kZWQ=

Links

30 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 13 T&L Activities:

Hex to Text

Description

Hexadecimal encoding represents characters using base-16 values. Your task: Decode the following hexadecimal string: 6865785f69735f66756e

Links

 

30 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 14 T&L Activities:

Binary Confusion

Description

Binary encoding represents data using only 0s and 1s. Your task: Decode the following binary message: 01100010 01101001 01101110 01100001 01110010 01111001 01011111 01110010 01110101 01101100 01100101 01110011

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 15 T&L Activities:

Caesar Cipher Reloaded

Description

The Caesar cipher shifts letters by a fixed amount, but this time the shift is less obvious. Your task: Decode the following message: fdhvdu_flskhu

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 16 T&L Activities:

URL Encoding Trap

Description

URL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal digits. But sometimes data is encoded more than once. Your task: Decode the following string: dXJsJTIwZW5jb2RpbmclMjBpcyUyMHNuZWFreQ==

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 17 T&L Activities:

Layered Encoding

Description

Sometimes data is encoded multiple times. Your task: Decode the following message: Z3J4ZW9oX29kYmh1dg==

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 18 T&L Activities:

XOR With a Twist

Description

XOR encryption uses a key to scramble data. Your task: Decrypt the following hex string using a single-byte XOR key: 3a2d301d2b311d322d35273024372e

Links

100 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 19 T&L Activities:

Backwards Thinking

Description

Sometimes the simplest trick is reversing the data. Your task: Decode the following message: sdrawrof_si_sdrawkcab

Links

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 19 T&L Activities:

Triple-Layer Nightmare

Description

This challenge uses multiple layers of encoding. Your task: Decode the following string: Njg2Zjc3NWY2OTczNWY2ODYxNzI2NA==

Links

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 20 T&L Activities:

Where in the World?

Description

A suspicious login attempt was detected from IP address '175.144.81.121'. Your job is to identify which country this IP address is registered to. Use a free IP lookup tool to find the country code (e.g., 'US' for United States, 'GB' for United Kingdom).

30 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 21 T&L Activities:

Domain Detective

Description

We've discovered a suspicious domain: 'https://ctf101.org/'. Use a WHOIS lookup tool to find out when this domain was registered. The flag is the registration year (4 digits).

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 22 T&L Activities:

The Email Trail

Description

A phishing email was sent to our organization. We've provided the email headers in a text file. Find the originating IP address (the first 'Received: from' entry). The flag is hidden as the last octet of that IP address. Click on the given hyperlink open the 'Email Headers Challenge' file.

Links

or

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 23 T&L Activities:

The Name Server Mystery

Description

A threat actor is using the domain 'https://tryhackme.com/'. Use an online DNS lookup tool to find the AMERICAN MX (Mail Exchange) record for this domain. The flag is the mail server name (without the domain part).

Links

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 24 T&L Activities:

Hidden in the Photo

Description

A threat actor posted this image online. The image contains GPS coordinates in its EXIF metadata. Use an online EXIF viewer to extract the latitude. The flag is the latitude rounded to 2 decimal places (format: XX.XX). Download the image using the link below.

Links

or

150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 25 T&L Activities:

The Digital Footprint

Description

We identified a suspicious username: 'cyberspyfromcanterbury'. Use the 'namechk.com' tool to find out how many platforms this username appears on from every website they check for. The flag is that number.

Links

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 26 T&L Activities:

Have I Been Compromised?

 Description

An employee's email '[email protected]' may have been in a data breach. Use HaveIBeenPwned (haveibeenpwned.com) to check. The flag is the name of the SECOND breach listed (if any) in lowercase with underscores instead of spaces.

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 27 T&L Activities:

The Time Traveler

Description

A malicious website has been taken down, but we need to see what it looked like on its first snapshot from January 1, 2025. Use the Wayback Machine (web.archive.org) to view the archived version of 'https://www.hackthebox.com/'. The secret message is the 3rd word (or the only word in the middle row) from the biggest text that appears on your screen.

Links

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 28 T&L Activities:

Name That Threat Group

Description

We detected an attack using the following hash: 'e7457a369d943b77648fc121e54728a3862740f8b4d7337ec15b8d0067244735'. Search for this hash on a threat intelligence platform (VirusTotal). The flag is the number of security vendors that flag this as malicious.

Links

 150 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 29 T&L Activities:

The Full Investigation

Description

You've received an anonymous tip about a suspicious domain: 'https://kmcc-uk.org/'. Step 1: Use WHOIS to find the registrar name. Step 2: Use DNS lookup to find the first A record (first IPv4 address). Step 3: Use IP geolocation to find the country code. Combine them in format: REGISTRAR_IP_COUNTRY (all uppercase, use first word of registrar only).

Links

200 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 30 T&L Activities:

Malware threat intel 1

Description

You work for the security operations centre (SOC) within an insurance company and some suspicious activity has been observed in the environment orginating from a program running on a user's device. You have been given the file hash - 30E527E45F50D2BA82865C5679A6FA998EE0A1755361AB01673950810D071C85 - and are tasked with gathering intel on this program using open source intelligence tools (OSINT). What is the most common filename associated with this suspicious program?

Links

75 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 31 T&L Activities:

Malware threat intel 2

Description

You work for the security operations centre (SOC) within an insurance company and some suspicious activity has been observed in the environment orginating from a program running on a user's device. You have been given the file hash - 30E527E45F50D2BA82865C5679A6FA998EE0A1755361AB01673950810D071C85 - and are tasked with gathering intel on this program using open source intelligence tools (OSINT). What suspicious url is found in the file's memory?

 

Links

75 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 32 T&L Activities:

3CX Supply Chain Attack 1

Description

A global financial services firm relies on the 3CX Desktop App for internal voice communications. After deploying a routine 3CX update, endpoint security tools intermittently quarantine the application on some systems, while others show no alerts. IT initially dismisses the warnings as false positives, but later detects unusual outbound traffic from the 3CX process to unknown external servers. Further investigation suggests the 3CX update was compromised prior to distribution, indicating a supply chain attack. You've been given a VMware blog post that will help your investigation - How many versions of 3CX running on Windows have been flagged as malware?

Links

75 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 33 T&L Activities:

3CX Supply Chain Attack 2

Description

A global financial services firm relies on the 3CX Desktop App for internal voice communications. After deploying a routine 3CX update, endpoint security tools intermittently quarantine the application on some systems, while others show no alerts. IT initially dismisses the warnings as false positives, but later detects unusual outbound traffic from the 3CX process to unknown external servers. Further investigation suggests the 3CX update was compromised prior to distribution, indicating a supply chain attack. You've been given the file hash - 59e1edf4d82fae4978e97512b0331b7eb21dd4b838b850ba46794d9c7a2c0983 - Which 2 malicious DLLs were dropped by the .msi file? Seperate each dll with a comma.

 

Links

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 34 T&L Activities:

Github Forensics 1

Description

A client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. An encoded password was discovered in a login page within one of the account's repositories, what is the decoded password?

Links

200 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 35 T&L Activities:

Github Forensics 2

Description

A client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. What API key was added to the login page?

Links

75 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 36 T&L Activities:

Github Forensics 3

Description

A client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. What is the well known RAT (Remote administration tool) that the insider forked?

Links

50 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 37 T&L Activities:

Github Forensics 4

Description

A client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. One of the compromised account's followers is based in Kanpur. Can you find their LinkedIn profile?

Links

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 38 T&L Activities:

AnyRun report analysis 1

Description

Dynamic analysis of malware can be conducted using public sandbox platforms such as ANY.RUN, which execute suspicious files in a controlled environment and record their behaviour. In this question you are provided a sandbox report. Read the report to answer the questions that follow. What is the full command that adds a certain file to the Microsoft Defender exclusions?

Links

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 39 T&L Activities:

AnyRun report analysis 2

Description

Dynamic analysis of malware can be conducted using public sandbox platforms such as ANY.RUN, which execute suspicious files in a controlled environment and record their behaviour. In this question you are provided a sandbox report. Read the report to answer the questions that follow. What process was a victim of injection?

Links

 

100 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 40 T&L Activities:

Hidden in Plain Sight

Description

Sometimes the answers are right in front of us, but we need the right tools to see them. We've hidden a flag inside the CSS styles of this page's background.

Links

60 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 41 T&L Activities:

The Whispering Console

Description

Developers often leave messages in the console to debug their code. This page sends a secret message to the console every time it loads.

Links

60 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 42 T&L Activities:

The Cookie Monster

Description

To access the secret area, you need to be an 'admin'. However, the system thinks you are just a 'guest'. Check your browser cookies!

Links

80 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 43 T&L Activities:

Jumbled Code

Description

A function runs when you click a button, but the code is unreadable. What does `String.fromCharCode(70, 76, 65, 71...)` mean?

Links

80 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 44 T&L Activities:

Secrets in Pixels

Description

We provided a logo for the event. If you look at the raw source code of the image file, you might find a Base64 encoded string hidden at the end.

Links

105 points


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 45 T&L Activities:

Forgotten Memory

Description

Websites don't just use cookies; they also use 'Local Storage' to remember things. Check if anything was left behind there.

Links

80 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 46 T&L Activities:

The Unclickable Button

Description

There is a 'Claim Flag' button, but it's grayed out and unclickable. Can you find a way to activate it?

Links

60 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 47 T&L Activities:

Hidden Requests

Description

When the page loads, it fetches a secret file from an API. You can't see it on the page, but you can see it in the network traffic.

Links

130 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 48 T&L Activities:

The Logic Gate

Description

The script checks if `isAuthorized` is true. We've set it to false. Can you override the system logic using the console?

Links

180 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 49 T&L Activities:

The Grand Finale

Description

This string has been through three layers of protection: It was converted to Hex, then Rot13, then Reversed. Can you undo it?

Links

 

 

180 points

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →