The official CTF from NCC 2025 is now public!
The second edition of NCC (North Coding Challenge – 2025) features a CTF that breaks away from traditional formats by exploring various IT fields, not just cybersecurity. This is the same version used during the live event, try it out at your own pace and learn something new.
Built by @hypertrophic, proudly for ECDH.
The North Coding Challenge follows a Capture The Flag (CTF) format hosted on a Linux machine. Each level is assigned to a unique user in the machine. Solving the challenge associated with a user will give you a flag, which also serves as the password to access the next user's environment.
-
Level 0:
user0hosts the first challenge --> Solving it revealspswd1 -
Level 1: Login as
user1usingpswd1--> Solving it providespswd2 -
Level 2: Login as
user2usingpswd2... and so on.
Each level is isolated and authored individually.
Unlike traditional CTFs that focus solely on cybersecurity, this edition of NCC aims to provide a broader exploration of the IT landscape. The challenges will touch on:
- Linux fundamentals and system usage
- Cryptography
- Cybersecurity concepts and practices
- Networking principles and tools
- Coding and scripting techniques
-
Install Docker if you don't have it.
-
Pull the image:
docker pull wissamecdh/ncc-2025- Run it:
docker run -it wissamecdh/ncc-2025- Username: ncc0
- Password: ncc0
There are 20 main flags to find, plus 7 bonus flags hidden across the system. Need help with a level? Want to verify a bonus flag? Contact us on: it@ecdh.ma