
PLAY.
HACK.
CAPTURE THE FLAG.
CTF's competitive platform with complex challenges and a stimulating environment to hone your cybersecurity skills

IN A FEW FIGURES
Let's summarize in a few figures the main advantages of BattleH4ck : the competitive platform of CTF
3
GAME MODES
To challenge yourself or a team, in a unique environment or in an arena
4
SECONDS
The average loading time for the creation of the environment and the loading of the mission
20
FREE MISSIONS
In campaign mode with a rotation every 3 months
Bravo for this platform ! The design gives a motivating and dynamic approach to CTF training. I love the functionality of the characters. As for the challenges, the promise is kept, you have to dig deep. Our skills are put to the test ... Can't wait to continue my training and unlock the next levels!
Elliot
Beta Tester
3 GAME MODES
The game modes are categories of exercises with their own features. Each mode presents a different way of approaching cybersecurity training with a defined pedagogy.
This game mode is 100% free
The campaign mode is a single player PVE (Player VS Environnent) mode. Presented in the form of missions, with 2 game modes:
NORMAL MODE: When a player starts a mission, a timer starts. The timer will stop only when the player has collected the 2 necessary flags.
SPEEDRUN MODE : : This mode is unlocked only when the normal mode is finished. In speedrun mode, the same mission is deployed. However, a sliding timer starts with a fixed duration of 5 minutes. After this time, the mission is shut down and the player has to start again. Try to make the best time!
The Time Attack mode is a competitive PVP (Player VS Player) mode and is played in teams of 5 against 5 players.
In this game mode, each team is subjected to an environment composed of 3 to 10 machines that are unique to it. Therefore, one topology per team is deployed.
A mission lasts one hour by default. After this time, teams can extend the duration via a vote.
The machines have a story and are linked together. Each machine hides flags to be recovered and allows to progress in the scenario. A game ends when a team has recovered all the flags or when the time is up. In the latter case, the team with the most flags wins.
The Arena mode is the second competitive game mode present on the platform. Still in PVP, it also requires 2 teams of 5 players. Unlike the Time Attack mode, both teams are placed in the same architecture.
Each team has 3 objectives to meet:
- Corrupt the machines placed in the center of the arena
- Attack the opponent's machine(s)
- Defend your machines against the competing team
The Arena mode uses the character mechanics presented in the Time Attack game. In addition to this feature, each team has a starting budget to spend in a store. This store is hosted in the architecture of the current game and offers different offensive and defensive tools. Players can choose to equip themselves with tools to complete their mission. When a team submits a correct flag, the budget is upgraded and can be spent again in the store.
3 GAME MODES
The game modes are categories of exercises with their own features. Each mode presents a different way of approaching cybersecurity training with a defined pedagogy.
CAMPAIGN MODE
The campaign mode is a single player PVE (Player VS Environnent) mode. Presented in the form of missions, with 2 game modes:
NORMAL MODE: When a player starts a mission, a progressive timer starts. The timer will stop only when the player has entered the 2 required flags.
SPEEDRUN MODE : : This mode is unlocked only when the normal mode is finished. In speedrun, the same mission is deployed. However, a sliding timer starts with a fixed duration of 5 minutes. After this time, the mission is shut down and the player must start over.
TIME ATTACK MODE
The Time Attack mode is a PVP (Player VS Player) mode and is played in teams of 5 against 5 players.
In this scenario, each team is subjected to an environment composed of 3 to 10 machines of its own. Therefore, 1 topology per team is deployed.
A mission lasts 1 hour by default. After this time, the teams can extend the duration via a vote.
The machines have a history and are linked together. Each machine hides flags to be recovered and allow to progress in the scenario. A game ends when a team has recovered all the flags or when the time is up. In the latter case, the team with the most flags wins.
ARENA MODE
- Corrupt the machines placed in the center of the arena.
- Attack the opponent's machine(s)
- Defend your machines against the competing team
The Arena mode uses the character mechanics presented in the Time Attack game. In addition to this feature, each team has a starting budget to spend in a store. This store is hosted in the architecture of the current game and offers different offensive and defensive tools. Players will be able to choose to equip themselves with tools to complete their mission. When a team submits a correct flag, the budget is upgraded and can be spent again in the store.
THE COMPETITIVE ENVIRONMENT
We wanted to create an e-sports environment to make cybersecurity fun and motivate all our users to consider a future career in cybersecurity!

THE EXPERIENCE
Evolve as you gain experience points
The experience points prove the player's investment and success. It is personal and progressive. When a player completes a mission, he earns experience points. The better the performance, the more experience points the player will earn.
By accumulating these points, the player will level up and unlock more and more complex missions and characters. After reaching a certain level, the player will unlock new competitive game modes.

ELO POINTS
Pure competition: become the best player
ELO is a point-based ranking system. A player starts with 1000 points.
In each game in the Time Attack and Arena modes, the player will play against another player of his level. If he wins, he gets points. If not, he loses points. These points are used to position yourself in a league.
The latter is separated into several categories defined according to the points acquired by the player:
- Level 0 -> 0 to 999 pts ELO
- Level 1 -> 1000 to 1999 pts ELO
- Level 2 -> 2000 to 2999 pts ELO
- [...]

THE CHALLENGES
Diversify your daily routine and continue to progress
To make the game experience more dynamic, the platform offers daily, weekly, monthly and unlimited time challenges. These challenges allow the player to try new techniques or to achieve feats.
By successfully completing these additional exercises, the player will earn additional experience points and badges to prove their success.
PLAY AS UNIQUE CHARACTERS
In the cyber world, each person has their own preferences or specialties. For example, scanning and recognition, reverse engineering, web, etc. The characters embody these specialties and dictate to the player a certain set of tools to use.
Kazius
A battle specialist, Kazius has always wanted to dominate his opponent. A highly trained man, he is present on all fronts thanks to his curious and interested nature. Kazius is not really an expert, but will easily defeat easy targets. In offensive security, he presents himself as Shaft's apprentice and is always in search of knowledge.

Roy
Sona's antagonist, Roy relies on brute force. He relies on the weakness and mistakes of his enemies and never misses his target. Roy has no regard for laws or ethics and records absolutely everything he finds during his attacks. With his experience, he has managed to create usernames:passwords lists that he resells at high prices on illegal sites.
It is by publishing this research on the Internet that he was spotted by the authorities. In return for the judge's favors, Roy must put his skills to good use in the service of the State.

Amber
A mathematician at heart, cryptology is her favorite field. Having developed her own encryption algorithm, she has powerful tools to test its robustness. Moreover, she is also specialized in the web world. Websites and databases do not resist long in the hands of Amber...

Effe
No one really knows who Effe is. We can't even tell if he or she is really human. All that is known is that Effe is more than comfortable with code and is able to retrieve important information. We can then think that Effe has code in his DNA.

Sona
Sona has always taken her time before attacking her target. Abused since childhood, she analyzes every fight to find the slightest vulnerability. Knowing that physical strength is not her strong suit, she has made computers her new playground. Sona is able to discreetly and accurately identify any type of target computer system.
Discreet, but not invisible, her government approached her and forced her to join the ranks. Sona is now the national reference in the study and recognition of information systems.

Dr. Jinn
A true virtuoso in development, Dr. Jinn doesn't care about already built tools. Her goal is to hinder the progress of large organizations by developing her own tools and making the code open-source. Born in a poor family, Jinn had to learn to fend for herself without resources. She has a hatred towards this world and sharing is not in her habits.


KAZIUS

ROY

AMBER

EFFE

SONA

DR. JINN
Dr. Jinn
A true virtuoso in development, Dr. Jinn doesn't care about already built tools. Her goal is to hinder the progress of large organizations by developing her own tools and making the code open-source. Born in a poor family, Jinn had to learn to fend for herself without resources. She has a hatred towards this world and sharing is not in her habits.

Sona
Sona has always taken her time before attacking her target. Abused since childhood, she analyzes every fight to find the slightest vulnerability. Knowing that physical strength is not her strong suit, she has made computers her new playground. Sona is able to discreetly and accurately identify any type of target computer system.
Discreet, but not invisible, her government approached her and forced her to join the ranks. Sona is now the national reference in the study and recognition of information systems.

Effe
No one really knows who Effe is. We can't even tell if he or she is likely human. All that is known is that Effe is more than comfortable with code and is able to retrieve important information. We can then think that Effe has code in his or her DNA.

Roy
Sona's antagonist, Roy relies on brute force. He relies on the weakness and mistakes of his enemies and never misses his target. Roy has no regard for laws or ethics and records absolutely everything he finds during his attacks. With his experience, he has managed to create usernames:passwords lists that he resells at high prices on illegal sites.
It is by publishing this research on the Internet that he was spotted by the authorities. In return for the judge's favors, Roy must put his skills to good use in the service of the State

Amber

Kazius
A battle specialist, Kazius has always wanted to dominate his opponent. A highly trained man, he is present on all fronts thanks to his curious and interested nature. Kazius is not really an expert, but will easily defeat easy targets. In offensive security, he presents himself as Shaft's apprentice and is always in search of knowledge.

BattleHack vs HackTheBox : which CTF platform is right for you ?
If you're here to understand the difference between BattleH4ck and HackTheBox, or if you're looking for an alternative, you're in the right place.

Recommend this CTF platform to my company
HR, training manager, sales manager, general manager. They are all concerned with supporting the development of employees' skills and the CTF training is a good lever to help employees progress.
Your company might be interested in proposing and funding this platform. Let's team up to convince them!
Enter your details to receive our commercial brochure
What is the CTF?
CTF (Capture the Flag) is a type of cybersecurity competition where participants must solve challenges to obtain "flags" hidden in computer systems. The flags can be strings, files or even encryption keys. Participants must use their computer skills and creativity to find the flags.
How does a CTF work?
A CTF is typically organized into several events, called "challenges." Each challenge is designed to test a specific cybersecurity skill, such as vulnerability scanning, reverse engineering or cryptography. Participants must solve the challenges to earn points, and the participant or team with the most points at the end of the competition is declared the winner.
How to prepare for a CTF?
To prepare for a CTF, participants must have a solid understanding of cybersecurity, as well as skills in programming, cryptography, and reverse engineering. They should also be familiar with commonly used security tools, such as vulnerability scanners and packet analysis tools. Participants can also practice by solving online CTF challenges or participating in smaller competitions to gain experience.
What are the benefits of participating in a CTF?
Participating in a CTF can offer several benefits, including the opportunity to gain cybersecurity experience, develop problem-solving skills, and network with other cybersecurity professionals. Participants can also win cash prizes or invitations to cybersecurity events.
How to participate in a CTF?
Most BTCs are open to everyone, and it is usually possible to participate online. BattleH4ck is free and open to all. Some BTCs may require advanced computer skills, while others are designed for beginners.
I'm a student, does BattleH4ck offer any discounts ?
Yes, BattleH4ck offers discounts to students. If you are a student, you can get a 30% discount on your BattleH4ck subscription. Simply provide proof of your student status to take advantage of this exclusive discount at student@seela.io
By subscribing to BattleH4ck as a student, you will have access to all the features of the competitive CTF platform.