The Insomni'hack 2025 CTF took place during the Insomni'hack conference in Lausanne, Switzerland, with challenges ranging from easy to complex.A participant shared their experience as a beginner focusing on easy challenges due to time constraints and fatigue.In one of the challenges 'Welcome To Insomni'hack', participants had to clone a repository, encountering suspicious commands in the package.json file.By analyzing the scripts, participants discovered encoded flags leading to successful completions of the challenge.Another challenge 'v0l4til3' involved memory analysis using Volatility to extract hash values and solve a flag-related task.A SQL injection vulnerability in the 'Crack the gate' challenge allowed participants to bypass authentication and obtain the flag.In the 'EG101' challenge, a crypto puzzle required decoding data and exploiting cryptographic operations to reveal the flag.Participants exploited LFI vulnerabilities in the 'Hawkta' challenge by manipulating parameters to access sensitive files and retrieve the flag.Overall, the Insomni'hack 2025 CTF offered a variety of challenges that tested participants' skills in cybersecurity and problem-solving.