Cyber security Challenge

A 24 hours online CTF competition about security in the field of coding, web, miscellaneous, crypto and binary.

Info

Stay tuned
24 hours
2-4 people per team
Monetary reward

Are you a student or a professional into cyber security?

Compete against coders and security experts from all around the world finding 25 flags in 5 different categories.

What's the challenge about?

The Cyber Security Challenge is a 24-intense-hours, international CTF competition, powered by Reply since 2018, where teams of security lovers come to solve a matrix of 25 problems made of 5 categories. The winning team is the one who finds the highest number of flags.

EXTERNALS' ED.
Open to coders and security experts from all over the world aged 16 years + at time of registration.
REPLYERS' ED.
An exclusive edition dedicated to Replyers, with a specific leaderboard leading to unique prizes and opportunities in Reply.

Join before it’s too late

To play the challenge registration in a team is needed.

While registering, tell us the name of your University to join the University Students' League and try to win a Reply Arcade Game or a financial donation for a research project.

Form your team online

To compete you have to form a team from 2-4 members.

  • If you already know some good coders, create your own team and invite your friends.

  • Otherwise search for and meet new teammates from all over the world on the Discord server.

⚠️ If you don’t join any team, your registration won’t be completed and you cannot take part to the challenge.

Learn and get ready

Do not waste time: while waiting for the next round train your skills with past editions problems and access exclusive tips and tricks to face a Capture the Flag competition as a real cyber security master.

💪 Practice will make you perfect.

Have fun while coding!

On the challenge day we’ll publish the 25 problems to be solved on your challenge page.

Solve the first three problems of each category to unlock the next levels, and find as many 🚩 hidden flags as you can. The more problems you solve, the higher you'll climb on the leaderboard.

Note: a write-up file explaining your problem solving strategy will confirm the winners ranking

Win unique prizes

One week after the CTF the final leader board will be published and all finalists for each category notified.

Each member of the winning team wins:

🥇 a Gaming laptop
🥈 a Beats Studio3 headphones
🥉 a Gaming keyboard Razer

Afraid of the low positions? Register to the University Students' League to have more chances to win special gadgets.

Why taking part

icon-rocket
Improve your knowledge
while having fun
icon-connection
Connect with talented
Replyers
icon-globe
Build your international
network of friends
icon-award
Earn your spotlight
and win unique prizes

Thanks to the Keen Minds

The challenge has been designed by a team of coding experts from Reply (the Keen Minds), that will support you the days of the challenge.

Giorgio

spike it

Gianmario

Liquid IT

Alessandro

Liquid IT

Alessandro

Spike IT

Roberto Carlo

Spike IT

Lorenzo

Spike IT

Erik

Spike IT

Luca

Spike IT

Alessandro

Spike IT

Alessio

Spike IT

Luisa

Liquid IT

Edilio

Spike IT

Marco

Spike IT

Ignazio

Spike IT

Riccardo

Spike IT

Laura

Spike IT

Gaspare

Reply holding

Dario Emilio

Spike IT

Andrea

Spike IT

Roberto

Spike it

Eugen

Spike IT

Simone

spike it

Giorgio

Spike it

Thanks to the Keen Minds

The challenge has been designed by a team of coding experts from Reply (the Keen Minds), that will support you the days of the challenge.

Card picture

Giorgio

spike it
Card picture

Gianmario

Liquid IT
Card picture

Alessandro

Liquid IT
Card picture

Alessandro

Spike IT
Card picture

Roberto Carlo

Spike IT
Card picture

Lorenzo

Spike IT
Card picture

Erik

Spike IT
Card picture

Luca

Spike IT
Card picture

Alessandro

Spike IT
Card picture

Alessio

Spike IT
Card picture

Luisa

Liquid IT
Card picture

Edilio

Spike IT
Card picture

Marco

Spike IT
Card picture

Ignazio

Spike IT
Card picture

Riccardo

Spike IT
Card picture

Laura

Spike IT
Card picture

Gaspare

Reply holding
Reply logo

Dario Emilio

Spike IT
Reply logo

Andrea

Spike IT
Reply logo

Roberto

Spike it
Reply logo

Eugen

Spike IT
Reply logo

Simone

spike it
Reply logo

Giorgio

Spike it

Thanks to the Keen Minds

The challenge has been designed by a team of coding experts from Reply (the Keen Minds), that will support you the days of the challenge.

Card picture

Giorgio

spike it
Card picture

Gianmario

Liquid IT
Card picture

Alessandro

Liquid IT
Card picture

Alessandro

Spike IT
Card picture

Roberto Carlo

Spike IT
Card picture

Lorenzo

Spike IT
Card picture

Erik

Spike IT
Card picture

Luca

Spike IT
Card picture

Alessandro

Spike IT
Card picture

Alessio

Spike IT
Card picture

Luisa

Liquid IT
Card picture

Edilio

Spike IT
Card picture

Marco

Spike IT
Card picture

Ignazio

Spike IT
Card picture

Riccardo

Spike IT
Card picture

Laura

Spike IT
Card picture

Gaspare

Reply holding
Reply logo

Dario Emilio

Spike IT
Reply logo

Andrea

Spike IT
Reply logo

Roberto

Spike it
Reply logo

Eugen

Spike IT
Reply logo

Simone

spike it
Reply logo

Giorgio

Spike it

Any doubts?

How will we get updates about the Reply Cyber Security Challenge?

First of all check your mailbox regularly: you’ll get some emails before and after the challenge. On this website you can monitor your challenge progress directly in your profile. If something won't be clear, you can always message the Reply Keen Minds during the challenge via chat.

What is a flag?

The flag is a token or a string that match the following regular expression: /\{FLG:.+\}/ where the content is any non-empty ASCII string (uppercase and lowercase letters, digits or symbols).

What are the categories?

The problems are divided into five categories (Coding, Web, Miscellaneous, Crypto, Binary), described below:

  • CODING – this category relates to problems you’ll need to solve using your programming languages and coding skills.

  • WEB – this category focuses on finding and exploiting vulnerabilities in web applications.

  • CRYPTO – this category involves attacking poorly implemented cryptographic algorithms, finding their vulnerabilities, then decrypting encrypted messages.

  • BINARY – this category involves reverse engineering and exploiting security vulnerabilities in binary applications.

  • MISCELLANEOUS – this category combines challenges from all the other categories, and requires additional skills such as stegano, forensic, recon, as well as general knowledge.

Join our community of challengers and start to code.

Get even more curious: discover the other challenges