Challenges FAQ
CTF challenges basically run down to; IT/Cyber Security puzzles, a digital scavenger hunt or escape room. Various types of CTF events exist, while CTFd makes it possible to host Jeopardy Style events. Events focussed on professionals or internal training, try to simulate realistic Cyber Security scenarios. Attack/Defence games or Red vs Blue scenarios, is where the Joint Cyber Range will be heading to in the future.
Before making a challenge
- Make sure to have a working local CTFd instance, see Starten met CTFd lokaal. For a simple vanilla CTFd instance use this Docker image (without our container challenges feature).
- General CTFd tutorials.
CTFd Challenges
- What about some example challenges?
-
JuiceShop with OWASP vulnerabilities.
-
How do I make my own CTF challenge?
- Workflow standard challenge (see tutorials)
- Workflow container based challenges
- Workflow dynamic challenge
Backup
- Is it possible to make a backup of my challenges?
- You can create a backup by exporting a zip file from your local CTFd instance, follow the steps at Backup and restore.
Managing
- How do I manage challenges
- Manage challenges inside CTFd
- Use the Challenge Manager
Categories
- What type of CTF challenges and categories are there?
- Types of CTF challenges and categories
- What are the challenge requirements?
- Get your challenges peer reviewed