Trustline Platform User Guide
Hacker Guides
Hacker Guides
  • Overview
    • 💡Quick Start
  • Trustline Products
    • 🐞Trustline Assessment Guide
      • 🏴‍☠️Apply to be a Pentester
      • ✉️Accept Invite to Assessment
      • 📝Assessment Testing
      • ⬇️Assessment Reporting
      • 🔁Assessment Remediation
      • ✔️Assessment Completion
    • 🕷️Trustline Bounty Guide
    • 🛡️Trustline Disclosure Guide
    • 🚩Trustline Challenges Guide
  • References
    • 📄Manage Reports Guide
    • 🔄Retesting Guide
    • 🏆Leaderboard and Hacktivity
      • 🎖️Trustline Leaderboard Guide
      • 🎯Trustline Hacktivity Guide
    • 🥇Trustline Point System
Powered by GitBook
On this page
  • Getting Started
  • 1. Accessing the Challenges Page
  • 2. Challenge Details
  • 3. Solving Challenges
  • 4. Challenge Rating
  • 5. Points System
  • 6. Challenge Categories
  1. Trustline Products

Trustline Challenges Guide

PreviousTrustline Disclosure GuideNextManage Reports Guide

Last updated 8 months ago

verview

Welcome to Trustline Challenges, where cybersecurity enthusiasts and professionals alike can engage in a variety of tasks designed to educate and challenge participants. This guide will walk you through the process of accessing, filtering, and understanding the challenges available on the platform.

Getting Started

1. Accessing the Challenges Page

1.1 Navigate to the Challenges Page:

  • Open the Trustline platform and navigate to the Challenges page.

  • On this page, you will find a list of challenges with details such as Name, Launch Date, Difficulty, Type, Rating, and User Solves.

1.2 Challenge Menus:

  • Active Challenges: Most of the Challenges on our lineup are Active. This means that no walkthroughs are allowed for them as long as they stay in this state. This offer points to the user who completes them depending on their difficulty.

  • Retired Challenges: These look and behave the same as the Active Challenges but do not offer you any points upon completion. However, they’re a good tool to learn what that category entails and what some of the ways of solving these are.

2. Challenge Details

2.1 Explore Challenge Details:

  • Click on any challenge to access its detailed information and submission area.

  • The challenge details include an overview tab and a Hacktivity tab.

  • Overview: Challenge details include:

    • Challenge Name

    • Launch Date

    • Challenge Creator: Click on the username to view their profile.

    • Number users solve: Shows how many hackers have solved the challenge. An icon updates if the Hacker has solved it.

    • Rating: Displays the average rating from hackers who completed the challenge and the number of ratings given.

    • Category

    • First Blood: Indicates the first participant to solve the challenge.

    • Flag Status: Shows if the challenge has been solved by you or not yet.

    • Go to Challenge: Click the button to open the challenge in a new tab and begin solving.

  • Hacktivity: Displays a list of hackers who have solved the challenge, including their rank, username, points earned.

3. Solving Challenges

3.1 Submitting Solutions:

  • Use the provided Submit Flag field on the challenge page to enter the flag obtained from solving the challenge and mark it as complete.

4. Challenge Rating

  • After submitting a flag, you will be prompted to rate the challenge. This feedback helps improve the challenge quality.

5. Points System

In Trustline Challenges, hackers can earn points based on the difficulty level of the challenges they complete. The points awarded are as follows:

  • Easy: 10 points

  • Medium: 20 points

  • Hard: 30 points

  • Reference: Trustline Point System

6. Challenge Categories

Trustline Challenges follow the Jeopardy Style, where challenges are categorized into different domains like web exploitation, binary exploitation, cryptography, and more. Each challenge yields a flag that needs to be submitted for points.

Trustline Challenges encompass a wide range of categories tailored to test various cybersecurity skills:

  • Web 🌐: Exploitation challenges focusing on web security flaws like injections, XSS, CSRF, IDOR, and other vulnerabilities.

  • Forensics 🕵🏻‍♀️: Tasks involving analysis of memory dumps, hidden files, encryption, and packet captures (PCAPs) to extract valuable information.

  • Crypto 🔐: Challenges centered around breaking or exploiting cryptographic algorithms and implementations.

  • Reversing (Reverse Engineering) 🔁: Reverse engineering challenges requiring analysis and understanding of program operations across different operating systems.

  • Pwn (Binary Exploitation) 🎮: Challenges aiming to exploit binary vulnerabilities to gain control over systems or containers.

  • OSINT 🔎: Open Source Intelligence challenges where participants gather and analyze publicly available information to solve problems.

  • Mobile 📱: Tasks focusing on analyzing and exploiting vulnerabilities in mobile applications on Android or iOS platforms.

  • Misc: Diverse challenges covering programming puzzles, steganography, and trivia that do not fit into other categories.

  • Code Review 🧑‍💻: Challenges centered on analyzing source code to identify vulnerabilities, bugs, or logic flaws.

🚩
Page cover image