Challenges
34 challenges
Cookie Monster
Welcome to Cookie Monster, a deliciously insecure login system! The developers were in a hurry and implemented their...
Verification Required
A company employee reported seeing a strange "security verification" while browsing. Shortly after completing the...
Exfiltration
Our IDS flagged suspicious outbound traffic from a workstation. The security team believes data was being exfiltrated,...
Access Denied
An application was accessed by an unauthorized user. We captured network traffic during the incident. Can you recover...
Packet Sniff
Our security team intercepted network traffic from a server that was recently compromised. The attacker connected...
Unusual Process
A security analyst discovered suspicious activity on a corporate workstation. A memory dump was captured during...
Shell Game
During a security incident, a memory dump was captured from a workstation suspected of running malicious scripts. Your...
AMOS
Inspired by real-world obfuscation techniques used in the AMOS Stealer malware, this challenge hides a flag using a...
Cyclix
Inspired by real-world malware obfuscation techniques, this challenge implements a cyclic encryption routine to hide...