In this CTF challenge, participants will explore various web application attacks such as cross-site scripting (XSS), SQL injection, remote code execution, and more. Open exclusively to RH-ISAC members, participants can play as an individual or as a team. They will analyze HTTP traffic to identify and differentiate between malicious and legitimate traffic and implement security rules to block the malicious traffic.

Participants will perform all analysis and rule implementations via a user-friendly web interface. This challenge aims to enhance their skills in web security, threat identification, and the application of effective security measures. Presented in partnership with Cato CTRL by Cato Networks.