CTF-Challenges Exploitation Involves x86 binary dissassembly, reverse engineering, and buffer overflows! Scripting Solving a series of coded messages with a time limit! Web Application Security Cross-site scripting