Skip to content

Common Pitfalls

DoS (Denial of Service)

  • Watch out for amplification techniques; service functionality that could be used to overwhelm the system with a relatively low amount of network traffic.

Exploitation/patchability

  • Consider lateral movement capabilities; ensure attackers access to multiple flag stores is possible only when explicitly intended and the exploit conditions are sufficiently restrictive.
  • Try to balance the difficulty to exploit and patch; vulnerabilities that are difficult to patch but easy to exploit are preferred. This is because the reverse case reduces traffic between teams and disincentivise core A/D strategies such as reverse-engineering exploits from traffic monitoring.

Checkers

  • Prevent checker fingerprinting; randomize functionality checks, use randomized user data, and vary user-agents.
  • Perform all available checks every round; unreliable checkers deny players consistent feedback for patches.
  • Check the service thoroughly; the goal is for teams to patch services, not reimplement SLA-compatible skeletons.

Inspired by lavish' CTF-Doc