
Crew CTF 2025 - Professor View Write-up
A course designed to take students’ knowledge to the next level.
A course designed to take students’ knowledge to the next level.
Thinking outside the box gives you a clue (Love Notes), but do you have what it takes to solve it?
Write messages to your crush but watch out, some hide secrets and some notes are better left unread
Learn how to detect and exploit SQL Injection vulnerabilities
Explore web attacks and detection methods through log and network traffic analysis.
Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.
Learn about digital forensics and related processes and experiment with a practical example.
Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas!
Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials.
Enumerating and Exploiting More Common Network Services & Misconfigurations