iTEC Cybersecurity Challenge

Welcome to the field.
A digital storm is brewing, and you're stepping into the middle of it. Over the next 40 hours, a chain of cyber events will unfold—scattered across compromised servers, leaked intelligence, and fractured systems.


The missions vary. The threat is real.
You'll investigate strange behavior inside company networks. Decode lost communications. Hunt for clues buried in plain sight. These aren't just puzzles—they're fragments of a bigger breach, scattered through layers of narrative and noise.

Each challenge stands alone, tied to stories of rogue insiders, shadow systems, forgotten protocols, or misconfigured entrypoints. Your task: infiltrate, uncover, and report. Sometimes with code. Sometimes with cunning.


Your arsenal:
Web, Forensics, Misc, Reverse Engineering, Pwn, and Social Engineering.
Each category contains beginner-friendly and expert-level tasks, crafted to teach, challenge, and entertain. No matter your experience level, there’s something here that’ll make you stop, think—and maybe panic a little.

This isn’t just a game. It’s a story unfolding through digital evidence, vulnerable systems, and clever traps.

“Trace the breaches. Follow the fragments. Find the flags.”