Challenges
31 challenges
Access Denied
An application was accessed by an unauthorized user. We captured network traffic during the incident. Can you recover...
Packet Sniff
Our security team intercepted network traffic from a server that was recently compromised. The attacker connected...
Unusual Process
A security analyst discovered suspicious activity on a corporate workstation. A memory dump was captured during...
Shell Game
During a security incident, a memory dump was captured from a workstation suspected of running malicious scripts. Your...
AMOS
Inspired by real-world obfuscation techniques used in the AMOS Stealer malware, this challenge hides a flag using a...
Cyclix
Inspired by real-world malware obfuscation techniques, this challenge implements a cyclic encryption routine to hide...
LockBit
Inspired by obfuscation techniques used in the LockBit ransomware family, this challenge implements a multi-layer...
Phantom
Inspired by encryption techniques used in the Phantom malware family, this challenge implements a cipher algorithm to...
Vidar
Inspired by encryption techniques used in the Vidar malware family, this challenge implements a cipher algorithm to...