Here are some images of the deployed application.
The view for a participant that is at the Yellow Belt Level
Each challenge contains details about the vulnerability being exploited.
The page listing software defences that are used to prevent the issues
The page listing the participants and their corresponding levels