Huntor be
hunted.
Web Recon.
4 challenges. 90 minutes. One jungle. Jungle Labs CTF — institutional email required to compete.
This isn't a tutorial.
No hand-holding. No hints until you've earned them. Find the vulnerabilities, extract the flags, climb the board.
The jungle rewards the persistent.
Four vectors. One winner.
HTML Recon
Web Recon
Something is hiding on this server. Inspect the source, read what the server reveals about itself. The flag is one curl away — if you know where to look.
Broken Access Control
IDOR / Access Control
You're user #1. The admin is user #2. There's no authentication check. Change one number and the vault opens. Simple — if you think to try.
SQL Injection
SQLi / Database
A login form with a vulnerable query. Bypass it or go further — extract the full users table. The admin's password is worth more than you think.
FTP Exfiltration
Network / File
Port scan the target. Find port 21. Login with credentials you discovered in Challenge 3. Download the archive. Unzip it. Read the flag. Each step earned.
First to solve each challenge earns a bonus. First blood is tracked in real time.
Who's ahead.
Mark your clock.
Know the terrain.
Interested in sponsoring? Contact us at ctf@jungle-labs.ai