Vuln.si 24/7 CTF
A Jeapordy style CTF is created out of challenges that a player (you) have to solve.
To do that you to find the flag which is a string that looks like flag{example} with the flag part being static throughout the competition and the example part being dynamic depeding on each challenge.
As a player you get files and/or an instance as a start and then you need to show your knowledge, skill, tools, wits, etc. to get to the flag.
When you have it you can submit it into this platform and get your well deserved points!
What might be new for some players is the use of instanced challenges.
That means you can get your very own instance of any challenge that's made this way which allows you to work with it however you want.
To use instanced challanges click the Instancer button in the navigation bar after you have logged in.
It will take you to another page with the listed challenges.
After starting one you can click on the instance to get the url, if it's a web, or an ncat link if it's a socket:
ncat --ssl example.vuln.si 443
Alternatively use can use openssl to connect using:
openssl s_client -connect example.vuln.si:443
While writing an exploit using pwntools specify the remote like:
remote("example.vuln.si", 443, ssl=True)
Currently flag formats include ptr{example} and dctf{example}.