Event starts in:
Scroll down to explore Pluto
SIX CORE CATEGORIES.
Progressively harder.
Pluto CTF features a wide range of challenges of varying difficulties across six of the most popular, practical, and relevant categories within cybersecurity. These categories reflect those present in other CTFs and practical training environments.
Web Exploitation (Web)
Find and exploit vulnerabilities in web applications, such as SQL injection, cross-site scripting (XSS), and more.
Reverse Engineering (Rev)
Analyze and reverse engineer binaries and other source code to understand their functionality, find vulnerabilities, and exploit them.
Cryptography (Crypto)
Solve challenges related to cryptographic algorithms and implementations, including encryption, decryption, and key management.
Forensics
Analyze digital evidence, such as memory dumps, disk images, and network traffic, to uncover hidden information and artifacts.
Mobile Security
Identify and exploit vulnerabilities in mobile applications and operating systems, from Android to iOS.
Miscellaneous (MISC)
A diverse category that includes more creative and experimental challenges, such as steganography, open-source intelligence (OSINT), and more.
WINNERS TAKE TO EARTH
FIRST PLACE
SECOND PLACE
THIRD PLACE
Plus bonus rewards for top teams!
PROUDLY SPONSORED BY