Offense. Defense. Resilience.

Team 1940 Cyber Security & CTF

We sharpen our skills through real challenge infrastructure, live scoring, and focused practice built around modern cyber threats.

Users

30

Challenges

9

Attempts

295

Correct Solves

56

Leaderboard Preview

View all

#1 Hexara_404

User

610

#2 Lightning

User

610

#3 zero

User

430

#4 gg_1

Admin

400

#5 Raven_hex_1

User

210

Recent Submissions

Raven_hex_1 · Strange Network Traffic

CTF Challenges · Network Security

Correct · 5/15/2026, 8:37:51 AM

Raven_hex_1 · Password Apocalypse..

CTF Challenges · Crypto

Incorrect · 5/15/2026, 8:31:49 AM

Raven_hex_1 · Password Apocalypse..

CTF Challenges · Crypto

Incorrect · 5/15/2026, 8:27:50 AM

Raven_hex_1 · Strange Network Traffic

CTF Challenges · Network Security

Incorrect · 5/15/2026, 8:17:37 AM

Raven_hex_1 · Strange Network Traffic

CTF Challenges · Network Security

Incorrect · 5/15/2026, 8:17:00 AM

Raven_hex_1 · Password Apocalypse..

CTF Challenges · Crypto

Incorrect · 5/15/2026, 8:13:43 AM

About 1940

Team 1940 builds practical cyber capability, not theory alone

We operate like a live offensive and defensive lab: analysis, repetition, and delivery inside practical cyber environments.

We are Team 1940, a cybersecurity-focused team specialized in modern technologies. We work on developing our skills and building smart solutions that simulate real-world threats. We believe that true learning comes from experience, so we focus on practical training and technical challenges.

Operational Domains

What Team 1940 actively trains

Our training lanes cover offensive research, defensive response, and deep technical analysis across modern surfaces.

01 /web

Web

Exploit routing flaws, auth mistakes, SSRF paths, and broken access controls.

02 /pwn

Pwn

Attack native binaries, memory corruption bugs, and hardened targets.

03 /crypto

Crypto

Break weak ciphers, flawed protocols, and implementation shortcuts.

04 /forensics

Forensics

Recover evidence, trace attacker activity, and extract hidden artifacts.

05 /reverse

Reverse

Dissect binaries and scripts to recover logic, secrets, and bypass paths.

06 /ai-security

AI Security

Test prompt injection, unsafe tooling, and model-driven attack surfaces.

07 /network-security

Network Security

Analyze traffic, protocols, segmentation, and network-level attack paths.

Browse the challenge board

Team Members

The people operating the 1940 grid

Add team members from the admin panel to populate this section with real CV cards.

Quick access

Move quickly through the 1940 platform

01

Join The Grid

Create an operator account, authenticate through a hardened session flow, and enter the training stack.

02

Break Systems

Work through live tasks, validate hypotheses, and map your offensive and defensive range.

03

Climb The Board

Each accepted solve updates scoring in real time and pushes your position higher.