Spike Reply pwn recruiting CTF Rules

  • The game consists in multiple challenges, distributed across different categories
  • For each challenge, you have to find the flag, that is a string in the following regexp format: {FLG:[^{}]*}
  • When you find a flag, you have to insert it in the answer input box (curly brackets included)
  • The perimeter of the game is well defined in the challenge description
  • It's suggested using a Linux VM

Behavioral Rules

It is strictly forbidden to:

  • Perform denial of service or other attacks (e.g. brute force) aimed to degrade network performance.
  • Attack other participants and steal flags.
  • Use automatic tools (e.g., Nessus) to solve a challenge. These won't help.

The traffic is monitored by Spike Reply. Intentional acts will be punished.