Welcome to Cyberbanak

Browse through our content or search for specific topics.

Level 4 CTF
Buffer Buffet
A 32-bit Linux ELF binary contains a classic stack buffer overflow vulnerability. The binary has no modern protections like ASLR or NX enabled, making it a perfect target for learning basic buffer overflow exploitation techniques.
Level 1 CTF
Overflow 101
Here's a simple binary exploitation CTF challenge example in C, focused on a classic buffer overflow vulnerability. It's designed to be solvable and educational for beginner to intermediate players.
Level 4 CTF
SecureCache Inc.
Welcome to SecureCache Inc.! We've implemented an aggressive caching system to speed up our web application. Our admin regularly checks the homepage to ensure everything is running smoothly. Your mission: Find a way to steal the admin's session cookie.
Level 2 CTF
Injection point
SecureBank’s shiny new login isn’t secure at all — a tiny SQL flaw lets anyone slip in as admin and snatch the flag. Classic injection strikes again!
Level 2 CTF
Ascendancy
The interface lies. Trust is misplaced. Watch the requests, not the buttons. When assumptions replace validation, privilege appears. Ascendancy rewards those who listen to what the server accepts—and what it forgets to refuse.
Level 3 CTF
Trust Issues
The application uses JWTs with multiple supported algorithms. The verification logic trusts user-controlled headers. Carefully inspect how the server selects its signing method and how the public key is used during token validation.
Level 1 walkthrough
Internal Leak: FTP Edition
Analyze captured FTP traffic from an internal security test. Since FTP is unencrypted, credentials and files are exposed. The goal is to study how attackers steal data by monitoring unencrypted traffic and using MITM techniques.
Level 3 CTF
Anatomy of an AD Breach
This CTF challenge involves a misconfigured SMB service where participants enumerate the service and exploit the flaw to retrieve hidden flags, building practical network and service enumeration skills.
Level 1 CTF
Hotel Search Bar
In this CTF challenge, the goal is to exploit a vulnerability in the hotel search engine's code to gain unauthorized access and execute arbitrary commands on the server.