All CTF participants must have a CSA XCON 2026 Standard Pass (minimum). Get Your Pass

Challenge Categories

Detailed breakdown of what to expect in each category. Challenges will be released at competition start.

Web Application Security

10+ Challenges Expected

Web application security challenges test your ability to find and exploit vulnerabilities in modern web applications. You'll encounter real-world scenarios involving authentication, authorization, injection attacks, API security, and more.

Topics Covered

  • SQL Injection (SQLi) - Classic, blind, time-based, and second-order injections
  • Cross-Site Scripting (XSS) - Reflected, stored, DOM-based, and mutation XSS
  • Server-Side Request Forgery (SSRF) - Internal service access, cloud metadata exploitation
  • Authentication Flaws - JWT attacks, OAuth misconfigurations, session management
  • API Security - REST/GraphQL vulnerabilities, BOLA, mass assignment
  • Server-Side Template Injection (SSTI) - Various template engines
  • Deserialization Attacks - PHP, Java, Python object injection
  • File Upload Vulnerabilities - Bypass techniques, web shells
Recommended Tools
Burp Suite OWASP ZAP SQLMap Postman curl/httpie Browser DevTools ffuf nuclei

AI / ML Security

10+ Challenges Expected

AI/ML Security is an emerging field focusing on vulnerabilities in artificial intelligence and machine learning systems. These challenges will test your ability to attack and defend AI systems, from traditional ML models to modern Large Language Models (LLMs).

Topics Covered

  • Prompt Injection - Direct and indirect prompt injection in LLMs
  • LLM Jailbreaking - Bypassing safety guardrails and content filters
  • Adversarial Attacks - Crafting inputs to fool image classifiers and NLP models
  • Model Extraction - Stealing model parameters through API queries
  • Data Poisoning - Manipulating training data to compromise models
  • Model Inversion - Extracting sensitive training data from models
  • Membership Inference - Determining if data was used in training
  • AI Agent Exploitation - Attacking autonomous AI agents and their tool use
Recommended Tools
Python PyTorch/TensorFlow Garak TextAttack ART (Adversarial Robustness Toolbox) LangChain Jupyter Notebook Hugging Face
Note: This is a cutting-edge category! Familiarity with basic ML concepts and Python is recommended but not required for easier challenges.

Cloud Security

10+ Challenges Expected

Cloud Security challenges focus on vulnerabilities in cloud infrastructure and services. You'll exploit misconfigurations in AWS, Azure, and GCP environments, attack containerized applications, and navigate complex IAM policies.

Topics Covered

  • IAM Misconfigurations - Overly permissive policies, privilege escalation paths
  • S3/Blob Storage Attacks - Public buckets, misconfigured ACLs, pre-signed URL abuse
  • Metadata Service Exploitation - IMDS attacks, credential theft via SSRF
  • Container Escapes - Docker breakouts, Kubernetes pod escapes
  • Kubernetes Security - RBAC bypass, secrets extraction, cluster compromise
  • Serverless Vulnerabilities - Lambda/Functions injection, event data attacks
  • Infrastructure as Code - Terraform/CloudFormation misconfigurations
  • Multi-Cloud Pivoting - Moving between cloud environments
Recommended Tools
AWS CLI Azure CLI gcloud CLI kubectl Pacu ScoutSuite Prowler CloudFox Trivy
Environment: Cloud challenges will use isolated lab environments. No real cloud accounts required - we provide temporary credentials for each challenge.

Ready to Test Your Skills?

30+ challenges across 3 cutting-edge categories. Cash prizes worth Rs 3,00,000+

Register to Compete
Bring Your Own Device Mandatory