
SunShine CTF 2025 - Web Forge Write-up
Use of automated fuzzing tools are allowed for this challenge. Fuzzing. Not Crawling. All endpoints aside from one are rate limited.

Use of automated fuzzing tools are allowed for this challenge. Fuzzing. Not Crawling. All endpoints aside from one are rate limited.

We have amazing new products for our gaming service! Unfortunately we dont sell our unreleased flag product yet !

Infiltrate the LunarAuth admin panel and gain access to the super secret FLAG artifact !

A course designed to take students’ knowledge to the next level.

Thinking outside the box gives you a clue (Love Notes), but do you have what it takes to solve it?

Write messages to your crush but watch out, some hide secrets and some notes are better left unread

Learn how to detect and exploit SQL Injection vulnerabilities

Explore web attacks and detection methods through log and network traffic analysis.

Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.

Learn about digital forensics and related processes and experiment with a practical example.