
Spike Reply pwn recruiting CTF Rules
- The game consists in multiple challenges, distributed across different categories
- For each challenge, you have to find the flag, that is a string in the following regexp format: {FLG:[^{}]*}
- When you find a flag, you have to insert it in the answer input box (curly brackets included)
- The perimeter of the game is well defined in the challenge description
- It's suggested using a Linux VM
Behavioral Rules
It is strictly forbidden to:
- Perform denial of service or other attacks (e.g. brute force) aimed to degrade network performance.
- Attack other participants and steal flags.
- Use automatic tools (e.g., Nessus) to solve a challenge. These won't help.
The traffic is monitored by Spike Reply. Intentional acts will be punished.