WeCTF 2021 is an educational Capture The Flag (CTF) resource providing a suite of penetration testing challenges and writeups for red team training.
WeCTF 2021 Source Code & Organizer's Writeup
This tool is designed for security enthusiasts, penetration testers, and red teamers to practice exploitation techniques and learn from detailed challenge writeups. Users can run the challenges locally via Docker to simulate real-world security scenarios and improve their offensive security skills.
Some challenges require manual environment setup in Dockerfiles and configuration files before running. Users should have Docker and Docker Compose installed. The repository serves as an educational resource and does not provide automated tooling but rather challenge environments and detailed writeups for learning exploitation techniques.
git clone https://github.com/wectf/2021
cd 2021
docker-compose up
For cloudtable and gallery challenges, setup environment in Dockerfile before building (commented out in docker-compose.yaml)
Configure auth.json and update bucket name in main.py to enable upload functionality
git clone https://github.com/wectf/2021
Clone the WeCTF 2021 repository locally.
cd 2021 && docker-compose up
Start all CTF challenge services locally using Docker Compose.
curl http://localhost:4001
Access the 'coin' challenge service running on port 4001.
Start a pull request to use GitHub Actions to leak DOCKER_USERNAME & DOCKER_PASSWORD
Exploit GitHub Actions secrets leakage vulnerability in the GitHub challenge.
Visit /flag.pppppp.css on cache service
Trigger the Cache challenge to reveal the flag after a delay.