Recap of Wizer’s 6-Hour Blitz CTF Event on March 15

 

On March 15th, we hosted our fifth 6-Hour Capture the Flag challenge! Over 1200+ developers and hackers from diverse backgrounds registered for this challenge. Participants tackled a series of challenges by hacking short snippets of code by spotting vulnerabilities and exploiting them.


Nearly 100 participants joined, with 42 successfully solving at least 1 challenge. We received 118 correct solutions in total! Five people solved 6 challenges, two people solved 5, and seven solved 3 and 2. 17 people solved the 1st challenge.

Congratulations to our CTF Challenge Winners!

1st - Alexandru Scanteie, 6/6 challenges solved within 3 hours 15 minutes 23 seconds

2nd - Jorg Maas, 6/6 challenges solved within 3 hours 15 minutes 44 seconds

3rd - Quinten VdW, 6/6 challenges solved within 3 hours 15 minutes 49 seconds




We’ll be sending out SWAG for the best writeups on any of the challenges you completed. The deadline for submissions is Sunday, March 29th at 10:00 am ET. Submit your writeup as a post on LinkedIn using the hashtag #wizerctf.



What Each Wizer CTF Challenge Covered: A Snapshot

Hand-Me-Down Privileges

What starts as a simple API challenge quickly turns into a lesson in broken session handling and trust gone wrong. Players had to look closely at how access was handed out, then turn that weakness into a working path to the flag.

First solver: skitty | Solvers: 42


Query Curious

A CRM endpoint was supposed to filter data safely, but curious minds found a way to ask much better questions. This challenge rewarded players who know how to probe APIs, manipulate inputs, and uncover data that was never meant to be exposed.

First solver: Dragos A | Solvers: 39


Nuts and Bolts

Wrapped in a playful hardware storefront, this challenge hid a much tougher technical core than its branding suggested. It pushed players to move past the obvious, understand the app’s moving parts, and piece together a path to a very hard-earned flag.

First solver: Alexandru Scanteie | Solvers: 3


Generic Marketing Site

A polished brochure site with all the usual buzzwords, but something underneath the surface wasn’t quite as generic as it looked. Players had to cut through the marketing gloss, inspect the application carefully, and find the flaw that gave them a way in.

First solver: Dragos A | Solvers: 13


Grand Theft Webshop

This dark web storefront invited players into a rougher, more chaotic challenge built around real attacker thinking. To win, they had to navigate the shop, abuse weak logic, and turn a shady ecommerce experience into a successful flag capture.

First solver: Jorg Maas | Solvers: 14


Open Browser Streamer

Framed like a live-stream review of user-submitted profiles, this challenge played on the risks of opening untrusted content in a real browser. It rewarded players who understand how seemingly harmless user input can become a powerful client-side attack.

First solver: Yannik Marchand | Solvers: 8



This event showcased a captivating blend of individual talent, creativity, and problem-solving as participants competed to overcome the challenges. Congratulations to all the winners! We look forward to seeing you all again soon. Stay tuned for our upcoming challenge announcement for Q2 of 2026!


Make sure to join our Discord to connect with our community and participate in our bi-weekly CTF Challenges.