Ghost in the Source
00 DAYS
:
00 HOURS
:
00 MINUTES
:
00 SECONDS
UNTIL CHALLENGE IS ACTIVE
June 21, 2025 • 12:00 PM EDT
CTF Challenge

Welcome to an opportunity to test your hacking skills in breaking client-side encryption that protects a closely guarded secret hidden somewhere on this site. We've created this as a gesture of appreciation for the privacy and security community and our dedicated Podcast listeners, so there will be a small prize for the 3 randomly selected people that manage to capture the flag!

⚠️ IMPORTANT: This challenge is independent and not affiliated with TryHackMe or any other platform. Participation requires strict adherence to the rules outlined below!

Quick Start

  1. Find
    Look for clues by viewing source code, navigating pages, and putting your hacking skills to the test.
  2. Decrypt
    Found something? Then it'll be time to put cryptographic cracking techniques to the test. If only there was a tool to help with this!
  3. Submit
    Use the contact form to submit your solution and be eligible for the prize.
  4. Claim
    To make it as fair as possible, 3 people who send the correct code via the contact form will be selected at random, providing they meet the criteria (see below). The winners will receive a 6-month subscription gift code for TryHackMe.

Prizes

3 correct submissions will be selected at random (see Submission Rules below):

🎁
6-Month TryHackMe Voucher

Premium access to cybersecurity training!

🎲
3 Winners Selected At Random

The technique and correctness matter!

👤
One per Person

Fair distribution

This challenge is independently organized and funded by PsySecure as a community giveback initiative.

Rules of Engagement

IN SCOPE

  • Cryptographic analysis
  • Password attacks
  • Source code review
  • Using our tools or your own
  • Content harvesting for wordlists

OUT OF SCOPE

Any infrastructure attacks = Immediate disqualification. This means attacking GitHub, Digital Ocean, Cloudflare, or any other service provider.

  • NO server attacks
  • NO network or port scanning
  • NO denial of service
  • NO social engineering

Submission Requirements

Use our contact form with:

  • Subject: "CTF Challenge Submission"
  • The CTF code you found
  • A description of your technique and approach

You must provide these 3 items for a valid submission.