Challenges
23 challenges
Exfiltration
Our IDS flagged suspicious outbound traffic from a workstation. The security team believes data was being exfiltrated,...
Access Denied
An application was accessed by an unauthorized user. We captured network traffic during the incident. Can you recover...
Packet Sniff
Our security team intercepted network traffic from a server that was recently compromised. The attacker connected...
Unusual Process
A security analyst discovered suspicious activity on a corporate workstation. A memory dump was captured during...
Shell Game
During a security incident, a memory dump was captured from a workstation suspected of running malicious scripts. Your...
Malware Style Obfuscation
Final boss. Modeled after real IoT malware like Mozi. Ciphertext:
Vice Auth
Inspired by authentication mechanisms in modern malware, this challenge implements a cipher-based proof-of-work system....
Vidar
Inspired by encryption techniques used in the Vidar malware family, this challenge implements a cipher algorithm to...
Phantom
Inspired by encryption techniques used in the Phantom malware family, this challenge implements a cipher algorithm to...