Trustline Challenges Guide
Last updated
Last updated
verview
Welcome to Trustline Challenges, where cybersecurity enthusiasts and professionals alike can engage in a variety of tasks designed to educate and challenge participants. This guide will walk you through the process of accessing, filtering, and understanding the challenges available on the platform.
1.1 Navigate to the Challenges Page:
Open the Trustline platform and navigate to the Challenges page.
On this page, you will find a list of challenges with details such as Name, Launch Date, Difficulty, Type, Rating, and User Solves.
1.2 Challenge Menus:
Active Challenges: Most of the Challenges on our lineup are Active. This means that no walkthroughs are allowed for them as long as they stay in this state. This offer points to the user who completes them depending on their difficulty.
Retired Challenges: These look and behave the same as the Active Challenges but do not offer you any points upon completion. However, they’re a good tool to learn what that category entails and what some of the ways of solving these are.
2.1 Explore Challenge Details:
Click on any challenge to access its detailed information and submission area.
The challenge details include an overview tab and a Hacktivity tab.
Overview: Challenge details include:
Challenge Name
Launch Date
Challenge Creator: Click on the username to view their profile.
Number users solve: Shows how many hackers have solved the challenge. An icon updates if the Hacker has solved it.
Rating: Displays the average rating from hackers who completed the challenge and the number of ratings given.
Category
First Blood: Indicates the first participant to solve the challenge.
Flag Status: Shows if the challenge has been solved by you or not yet.
Go to Challenge: Click the button to open the challenge in a new tab and begin solving.
Hacktivity: Displays a list of hackers who have solved the challenge, including their rank, username, points earned.
3.1 Submitting Solutions:
Use the provided Submit Flag field on the challenge page to enter the flag obtained from solving the challenge and mark it as complete.
After submitting a flag, you will be prompted to rate the challenge. This feedback helps improve the challenge quality.
In Trustline Challenges, hackers can earn points based on the difficulty level of the challenges they complete. The points awarded are as follows:
Easy: 10 points
Medium: 20 points
Hard: 30 points
Reference: Trustline Point System
Trustline Challenges follow the Jeopardy Style, where challenges are categorized into different domains like web exploitation, binary exploitation, cryptography, and more. Each challenge yields a flag that needs to be submitted for points.
Trustline Challenges encompass a wide range of categories tailored to test various cybersecurity skills:
Web 🌐: Exploitation challenges focusing on web security flaws like injections, XSS, CSRF, IDOR, and other vulnerabilities.
Forensics 🕵🏻♀️: Tasks involving analysis of memory dumps, hidden files, encryption, and packet captures (PCAPs) to extract valuable information.
Crypto 🔐: Challenges centered around breaking or exploiting cryptographic algorithms and implementations.
Reversing (Reverse Engineering) 🔁: Reverse engineering challenges requiring analysis and understanding of program operations across different operating systems.
Pwn (Binary Exploitation) 🎮: Challenges aiming to exploit binary vulnerabilities to gain control over systems or containers.
OSINT 🔎: Open Source Intelligence challenges where participants gather and analyze publicly available information to solve problems.
Mobile 📱: Tasks focusing on analyzing and exploiting vulnerabilities in mobile applications on Android or iOS platforms.
Misc: Diverse challenges covering programming puzzles, steganography, and trivia that do not fit into other categories.
Code Review 🧑💻: Challenges centered on analyzing source code to identify vulnerabilities, bugs, or logic flaws.