Welcome to Cyberbanak

Browse through our content or search for specific topics.

Level 2 CTF
Ghost Protocol
The device isn’t hiding much—just speaking in code. Watch the boot messages carefully, spot the encoding, and translate the gibberish. Decode the signal, and the flag will quietly reveal itself.
Level 4 CTF
Phantom Protocol
The ghost left breadcrumbs in code and chaos. Each file hides part of the truth—scrambled, reversed, and encrypted. Rebuild the pieces, follow the traces, and you’ll uncover the Phantom’s final secret flag.
Level 2 CTF
Down The Rabbit Hole
Keep digging through the files! Each layer hides another clue. Unzip, decode, and explore—you’ll find the secret flag waiting at the very bottom of the rabbit hole.
Level 1 CTF
Whispers in The Wire
Look past the image—PNG files end with IEND chunk, but extra bytes after that stay hidden from viewers. Strings command on suspicious_memo.png pulls out the flag lurking in the tail end.
Level 5 CTF
The Phantom Session
A secret admin panel, a weak session system, and leaked clues in plain sight — uncover how predictable randomness can lead you straight to the flag in The Phantom Session.
Level 2 CTF
The Image Resizer
The application validates file paths, but the validation isn't comprehensive. Think about how directory navigation works in file systems and how you might access parent directories while still passing the initial security check.
Level 5 CTF
Broken Authentication API
Focus on the JWT implementation. The server accepts multiple signing algorithms — but are they all secure? Check what the debug endpoint reveals about token processing. Remember: authentication flaws often come from trusting user-controlled data too much.
Level 2 CTF
The Hidden Password!
A secret glimmers within the code — each fragment of hex conceals a trace of meaning. Assemble the pieces, and clarity will emerge from the static.
Level 4 CTF
Buffer Buffet
A 32-bit Linux ELF binary contains a classic stack buffer overflow vulnerability. The binary has no modern protections like ASLR or NX enabled, making it a perfect target for learning basic buffer overflow exploitation techniques.