Offical URL: https://metasploitctf.com/

It’s time for another Metasploit community CTF! We're back on our usual end-of-year schedule this time around, and we’re doing a few things differently. Past CTFs have featured a wide range of challenges across different architectures, difficulty levels, and targets. This year, we wanted to make the CTF beginner-friendly—so we developed a more focused game with a single Linux target, prizes for more teams, and a variety of easy and medium challenges that aim to help infosec newcomers build practical skills. As always, teams are encouraged, and once again we’ll have no cap on the number of players who can join a team. Read on for full competition details, and join the #metasploit-ctf channel on Slack (https://metasploit.com/slack) to start building your team.

Contest website: https://metasploitctf.com/

Announcement / FAQs https://blog.rapid7.com/2020/11/19/announcing-the-2020-december-metasploit-community-ctf/

Official Contest Terms: https://information.rapid7.com/rs/411-NAK-970/images/Metasploit-Community-CTF-2020-Official-Rules%20%28approved%20for%20CTFd%20_teams_%29.pdf

CTF events

NameWeight
2020 December Metasploit community CTF23.94
2020 Metasploit community CTF0.00
Related tags: web pwn x86 php crypto hacking forensics python c++ metasploit java misc sql exploit nothing cracking bash linux lfi password none sleeping jail bof dns reversing reverse_engineering crc pickle command_injection escalation zip privilege talking proxy lfsr privesc linker graphql subdomain