| Week 1 | T&L Activities:Network OwnershipA suspicious login originated from IP address '1.1.1.1'. Identify the Autonomous System (AS) organization that owns this IP address. Please use lower case for the answer. 50points Hint :Use an IP lookup or BGP/ASN lookup tool. Hint: Look for the 'AS Organization' field. Hnt: The flag format is FLAG{organization_name}. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 2 | T&L Activities:DNS InfrastructureDescriptionInvestigate the domain 'iana.org'. Identify one of its authoritative name servers (NS record). Extract only the hostname before the first dot. LinksFiles that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 3 | T&L Activities:Email AuthenticationDescriptionInvestigate the domain 'google.com'. Identify the mechanism used in its SPF record that authorizes sending mail. 100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 4 | T&L Activities:Reverse LookupDescriptionPerform a reverse DNS lookup on the IP address '8.8.8.8'. Identify the primary hostname associated with this IP. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 5 | T&L Activities:Metadata TrailDescriptionAn image shared by a threat actor contains specific file permissions in its EXIF metadata. Extract the specific file permissions, make sure to include every '-' in the answer. Linksor 150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 6 | T&L Activities:Open Source LicenseDescriptionInvestigate the GitHub repository 'torvalds/linux'. Identify the license used by the project. Note that case-sensitivity matters. Links150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 7 | T&L Activities:Breach ExposureDescriptionAn employee's email address '[email protected]' may have appeared in a data breach. Use Have I Been Pwned to investigate. Identify the first listed breach. Use lowercase in the flag. Links150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 8 | T&L Activities:Malware Behaviour AnalysisDescriptionSearch the hash '44d88612fea8a8f36de82e1278abb02f' on VirusTotal. Identify the file type detected. Links150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 9 | T&L Activities:Archived Source InspectionDescriptionUse the Wayback Machine to locate the earliest available archived snapshot of 'https://www.offensive-security.com'. Open that snapshot and inspect the HTML source of the archived page itself (not the Wayback interface). Within the page’s HEADER section, identify the first word of the first paragraph contained there. The answer is case-sensitive. Links200 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 10 | T&L Activities:Authoritative SourceDescriptionInvestigate the domain 'iana.org'. Identify the primary nameserver listed in its SOA (Start of Authority) DNS record. Links
200 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 11 | T&L Activities:ROT13 Warm-UpDescriptionROT13 is a simple letter substitution cipher that replaces a letter with the 13th letter after it in the alphabet. Your task: Decode the following message: ebg13_vf_rnfl
Links30 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 12 | T&L Activities:Base64 BasicsDescriptionBase64 is a common encoding scheme used to represent binary data in ASCII text. Your task: Decode the following string: YmFzZTY0X2RlY29kZWQ= Links30 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 13 | T&L Activities:Hex to TextDescriptionHexadecimal encoding represents characters using base-16 values. Your task: Decode the following hexadecimal string: 6865785f69735f66756e Links
30 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 14 | T&L Activities:Binary ConfusionDescriptionBinary encoding represents data using only 0s and 1s. Your task: Decode the following binary message: 01100010 01101001 01101110 01100001 01110010 01111001 01011111 01110010 01110101 01101100 01100101 01110011 Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 15 | T&L Activities:Caesar Cipher ReloadedDescriptionThe Caesar cipher shifts letters by a fixed amount, but this time the shift is less obvious. Your task: Decode the following message: fdhvdu_flskhu Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 16 | T&L Activities:URL Encoding TrapDescriptionURL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal digits. But sometimes data is encoded more than once. Your task: Decode the following string: dXJsJTIwZW5jb2RpbmclMjBpcyUyMHNuZWFreQ== Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 17 | T&L Activities:Layered EncodingDescriptionSometimes data is encoded multiple times. Your task: Decode the following message: Z3J4ZW9oX29kYmh1dg== Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 18 | T&L Activities:XOR With a TwistDescriptionXOR encryption uses a key to scramble data. Your task: Decrypt the following hex string using a single-byte XOR key: 3a2d301d2b311d322d35273024372e Links100 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 19 | T&L Activities:Backwards ThinkingDescriptionSometimes the simplest trick is reversing the data. Your task: Decode the following message: sdrawrof_si_sdrawkcab Links150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 19 | T&L Activities:Triple-Layer NightmareDescriptionThis challenge uses multiple layers of encoding. Your task: Decode the following string: Njg2Zjc3NWY2OTczNWY2ODYxNzI2NA== Links150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 20 | T&L Activities:Where in the World?DescriptionA suspicious login attempt was detected from IP address '175.144.81.121'. Your job is to identify which country this IP address is registered to. Use a free IP lookup tool to find the country code (e.g., 'US' for United States, 'GB' for United Kingdom). 30 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 21 | T&L Activities:Domain DetectiveDescriptionWe've discovered a suspicious domain: 'https://ctf101.org/'. Use a WHOIS lookup tool to find out when this domain was registered. The flag is the registration year (4 digits). Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 22 | T&L Activities:The Email TrailDescriptionA phishing email was sent to our organization. We've provided the email headers in a text file. Find the originating IP address (the first 'Received: from' entry). The flag is hidden as the last octet of that IP address. Click on the given hyperlink open the 'Email Headers Challenge' file. Linksor 50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 23 | T&L Activities:The Name Server MysteryDescriptionA threat actor is using the domain 'https://tryhackme.com/'. Use an online DNS lookup tool to find the AMERICAN MX (Mail Exchange) record for this domain. The flag is the mail server name (without the domain part). Links100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 24 | T&L Activities:Hidden in the PhotoDescriptionA threat actor posted this image online. The image contains GPS coordinates in its EXIF metadata. Use an online EXIF viewer to extract the latitude. The flag is the latitude rounded to 2 decimal places (format: XX.XX). Download the image using the link below. Linksor 150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 25 | T&L Activities:The Digital FootprintDescriptionWe identified a suspicious username: 'cyberspyfromcanterbury'. Use the 'namechk.com' tool to find out how many platforms this username appears on from every website they check for. The flag is that number. Links100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 26 | T&L Activities:Have I Been Compromised?DescriptionAn employee's email '[email protected]' may have been in a data breach. Use HaveIBeenPwned (haveibeenpwned.com) to check. The flag is the name of the SECOND breach listed (if any) in lowercase with underscores instead of spaces. Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 27 | T&L Activities:The Time TravelerDescriptionA malicious website has been taken down, but we need to see what it looked like on its first snapshot from January 1, 2025. Use the Wayback Machine (web.archive.org) to view the archived version of 'https://www.hackthebox.com/'. The secret message is the 3rd word (or the only word in the middle row) from the biggest text that appears on your screen. Links100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 28 | T&L Activities:Name That Threat GroupDescriptionWe detected an attack using the following hash: 'e7457a369d943b77648fc121e54728a3862740f8b4d7337ec15b8d0067244735'. Search for this hash on a threat intelligence platform (VirusTotal). The flag is the number of security vendors that flag this as malicious. Links150 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 29 | T&L Activities:The Full InvestigationDescriptionYou've received an anonymous tip about a suspicious domain: 'https://kmcc-uk.org/'. Step 1: Use WHOIS to find the registrar name. Step 2: Use DNS lookup to find the first A record (first IPv4 address). Step 3: Use IP geolocation to find the country code. Combine them in format: REGISTRAR_IP_COUNTRY (all uppercase, use first word of registrar only). Links200 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 30 | T&L Activities:Malware threat intel 1DescriptionYou work for the security operations centre (SOC) within an insurance company and some suspicious activity has been observed in the environment orginating from a program running on a user's device. You have been given the file hash - 30E527E45F50D2BA82865C5679A6FA998EE0A1755361AB01673950810D071C85 - and are tasked with gathering intel on this program using open source intelligence tools (OSINT). What is the most common filename associated with this suspicious program? Links75 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 31 | T&L Activities:Malware threat intel 2DescriptionYou work for the security operations centre (SOC) within an insurance company and some suspicious activity has been observed in the environment orginating from a program running on a user's device. You have been given the file hash - 30E527E45F50D2BA82865C5679A6FA998EE0A1755361AB01673950810D071C85 - and are tasked with gathering intel on this program using open source intelligence tools (OSINT). What suspicious url is found in the file's memory?
Links75 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 32 | T&L Activities:3CX Supply Chain Attack 1DescriptionA global financial services firm relies on the 3CX Desktop App for internal voice communications. After deploying a routine 3CX update, endpoint security tools intermittently quarantine the application on some systems, while others show no alerts. IT initially dismisses the warnings as false positives, but later detects unusual outbound traffic from the 3CX process to unknown external servers. Further investigation suggests the 3CX update was compromised prior to distribution, indicating a supply chain attack. You've been given a VMware blog post that will help your investigation - How many versions of 3CX running on Windows have been flagged as malware? Links75 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 33 | T&L Activities:3CX Supply Chain Attack 2DescriptionA global financial services firm relies on the 3CX Desktop App for internal voice communications. After deploying a routine 3CX update, endpoint security tools intermittently quarantine the application on some systems, while others show no alerts. IT initially dismisses the warnings as false positives, but later detects unusual outbound traffic from the 3CX process to unknown external servers. Further investigation suggests the 3CX update was compromised prior to distribution, indicating a supply chain attack. You've been given the file hash - 59e1edf4d82fae4978e97512b0331b7eb21dd4b838b850ba46794d9c7a2c0983 - Which 2 malicious DLLs were dropped by the .msi file? Seperate each dll with a comma.
Links100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 34 | T&L Activities:Github Forensics 1DescriptionA client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. An encoded password was discovered in a login page within one of the account's repositories, what is the decoded password? Links200 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 35 | T&L Activities:Github Forensics 2DescriptionA client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. What API key was added to the login page? Links75 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 36 | T&L Activities:Github Forensics 3DescriptionA client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. What is the well known RAT (Remote administration tool) that the insider forked? Links50 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 37 | T&L Activities:Github Forensics 4DescriptionA client has requested assistance after a network compromise caused a full outage. Preliminary forensic analysis shows the attack originated from a single user account, indicating a potential insider threat. Investigate the incident to identify the insider and determine the actions taken during the attack. You have been given the compromised user's github profile - https://github.com/EMarseille99. One of the compromised account's followers is based in Kanpur. Can you find their LinkedIn profile? Links100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 38 | T&L Activities:AnyRun report analysis 1DescriptionDynamic analysis of malware can be conducted using public sandbox platforms such as ANY.RUN, which execute suspicious files in a controlled environment and record their behaviour. In this question you are provided a sandbox report. Read the report to answer the questions that follow. What is the full command that adds a certain file to the Microsoft Defender exclusions? Links100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 39 | T&L Activities:AnyRun report analysis 2DescriptionDynamic analysis of malware can be conducted using public sandbox platforms such as ANY.RUN, which execute suspicious files in a controlled environment and record their behaviour. In this question you are provided a sandbox report. Read the report to answer the questions that follow. What process was a victim of injection? Links
100 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 40 | T&L Activities:Hidden in Plain SightDescriptionSometimes the answers are right in front of us, but we need the right tools to see them. We've hidden a flag inside the CSS styles of this page's background. Links
60 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 41 | T&L Activities:The Whispering ConsoleDescriptionDevelopers often leave messages in the console to debug their code. This page sends a secret message to the console every time it loads. Links
60 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 42 | T&L Activities:The Cookie MonsterDescriptionTo access the secret area, you need to be an 'admin'. However, the system thinks you are just a 'guest'. Check your browser cookies! Links
80 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 43 | T&L Activities:Jumbled CodeDescriptionA function runs when you click a button, but the code is unreadable. What does `String.fromCharCode(70, 76, 65, 71...)` mean? Links
80 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 44 | T&L Activities:Secrets in PixelsDescriptionWe provided a logo for the event. If you look at the raw source code of the image file, you might find a Base64 encoded string hidden at the end. Links105 points Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 45 | T&L Activities:Forgotten MemoryDescriptionWebsites don't just use cookies; they also use 'Local Storage' to remember things. Check if anything was left behind there. Links
80 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 46 | T&L Activities:The Unclickable ButtonDescriptionThere is a 'Claim Flag' button, but it's grayed out and unclickable. Can you find a way to activate it? Links
60 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 47 | T&L Activities:Hidden RequestsDescriptionWhen the page loads, it fetches a secret file from an API. You can't see it on the page, but you can see it in the network traffic. Links
130 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 48 | T&L Activities:The Logic GateDescriptionThe script checks if `isAuthorized` is true. We've set it to false. Can you override the system logic using the console? Links
180 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |
| Week 49 | T&L Activities:The Grand FinaleDescriptionThis string has been through three layers of protection: It was converted to Hex, then Rot13, then Reversed. Can you undo it? Links
180 points
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
| Maths:
|
|||||
| Stretch and Challenge:
|
E&D / BV | ||||
| Homework / Extension:
|
ILT | ||||
| → | → | → | → | → | → |