Pluto CTF Logo

Event starts in:

00 Days
00 Hours
00 Minutes
00 Seconds

Scroll down to explore Pluto

SIX CORE CATEGORIES.

Progressively harder.

Pluto CTF features a wide range of challenges of varying difficulties across six of the most popular, practical, and relevant categories within cybersecurity. These categories reflect those present in other CTFs and practical training environments.

Web Exploitation (Web)

Find and exploit vulnerabilities in web applications, such as SQL injection, cross-site scripting (XSS), and more.

SP-DEV SP-TST SP-SYS T1059
Reverse Engineering (Rev)

Analyze and reverse engineer binaries and other source code to understand their functionality, find vulnerabilities, and exploit them.

AN-EXP SP-DEV SP-STT T1027
Cryptography (Crypto)

Solve challenges related to cryptographic algorithms and implementations, including encryption, decryption, and key management.

PR-VAM SP-ARC T1548 T1068
Forensics

Analyze digital evidence, such as memory dumps, disk images, and network traffic, to uncover hidden information and artifacts.

PR-CDA SP-DEV T1190 T1071.001
Mobile Security

Identify and exploit vulnerabilities in mobile applications and operating systems, from Android to iOS.

AN-EXP SP-SYS T1055 T1203
Miscellaneous (MISC)

A diverse category that includes more creative and experimental challenges, such as steganography, open-source intelligence (OSINT), and more.

PR-VAM SP-TST T1068 T1204

WINNERS TAKE TO EARTH

1

FIRST PLACE

$1024
Exclusive Trophy
Job Interview Opportunity
2

SECOND PLACE

$512
Special Recognition
Swag Pack
3

THIRD PLACE

$256
Certificate
Digital Badge

Plus bonus rewards for top teams!

PROUDLY SPONSORED BY