 |
Pickle Rick |
A Rick and Morty CTF. Help turn Rick back into a human! |
Easy
|
Challenge
|
 |
OpenVPN |
A guide to connecting to our network using OpenVPN. |
Easy
|
Walkthrough
|
 |
Upload Vulnerabilities |
Tutorial room exploring some basic file-upload vulnerabilities in websites |
Easy
|
Walkthrough
|
 |
OWASP Juice Shop |
This room uses the Juice Shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities. |
Easy
|
Walkthrough
|
 |
Linux Fundamentals Part 1 |
Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal. |
Info
|
Walkthrough
|
 |
Linux Fundamentals Part 2 |
Continue your learning Linux journey with part two. You will be learning how to log in to a Linux machine using SSH, how to advance your commands, file system interaction. |
Info
|
Walkthrough
|
 |
How Websites Work |
To exploit a website, you first need to know how they are created. |
Easy
|
Walkthrough
|
 |
DNS in Detail |
Learn how DNS works and how it helps you access internet services. |
Easy
|
Walkthrough
|
 |
HTTP in Detail |
Learn about how you request content from a web server using the HTTP protocol |
Easy
|
Walkthrough
|
 |
Phishing Analysis Fundamentals |
Learn all the components that make up an email. |
Easy
|
Walkthrough
|
 |
Phishing Emails in Action |
Learn the different indicators of phishing attempts by examining actual phishing emails. |
Easy
|
Walkthrough
|
 |
Junior Security Analyst Intro |
Play through a day in the life of a Security Analyst and experience their everyday duties. |
Easy
|
Walkthrough
|
 |
Pyramid Of Pain |
Learn what is the Pyramid of Pain and how to utilize this model to determine the level of difficulty it will cause for an adversary to change the indicators associated with them, and their campaign. |
Easy
|
Walkthrough
|
 |
Cyber Kill Chain |
The Cyber Kill Chain framework is designed for identification and prevention of the network intrusions. You will learn what the adversaries need to do in order to achieve their goals. |
Easy
|
Walkthrough
|
 |
Intro to Malware Analysis |
What to do when you run into a suspected malware. |
Medium
|
Walkthrough
|
 |
Offensive Security Intro |
Hack your first website (legally in a safe environment) and experience an ethical hacker's job. |
Easy
|
Walkthrough
|
 |
Defensive Security Intro |
Introducing defensive security and related topics, such as Threat Intelligence, SOC, DFIR, Malware Analysis, and SIEM. |
Easy
|
Walkthrough
|
 |
Careers in Cyber |
Learn about the different careers in cyber security. |
Info
|
Walkthrough
|
 |
Introduction to SIEM |
Learn the fundamentals of SIEM and explore its features and functionality. |
Easy
|
Walkthrough
|
 |
OWASP API Security Top 10 - 1 |
Learn the basic concepts for secure API development (Part 1). |
Medium
|
Walkthrough
|
 |
Burp Suite: The Basics |
An introduction to using Burp Suite for web application pentesting. |
Info
|
Walkthrough
|
 |
Burp Suite: Repeater |
Learn how to use Repeater to duplicate requests in Burp Suite. |
Info
|
Walkthrough
|
 |
Burp Suite: Intruder |
Learn how to use Intruder to automate requests in Burp Suite. |
Medium
|
Walkthrough
|
 |
Burp Suite: Other Modules |
Take a dive into some of Burp Suite's lesser-known modules. |
Easy
|
Walkthrough
|
 |
Burp Suite: Extensions |
Learn how to use Extensions to broaden the functionality of Burp Suite. |
Easy
|
Walkthrough
|
 |
Networking Essentials |
Explore networking protocols from automatic configuration to routing packets to the destination. |
Easy
|
Walkthrough
|
 |
SOC L1 Alert Triage |
Learn more about SOC alerts and build a systematic approach to efficiently triaging them. |
Easy
|
Walkthrough
|
 |
SOC L1 Alert Reporting |
Learn how to properly report, escalate, and communicate about high-risk SOC alerts. |
Easy
|
Walkthrough
|
 |
SOC Workbooks and Lookups |
Discover useful corporate resources to help you structure and simplify L1 alert triage. |
Easy
|
Walkthrough
|
 |
SOC Metrics and Objectives |
Explore key metrics driving SOC effectiveness and discover ways to improve them. |
Easy
|
Walkthrough
|
 |
The Game |
Practice your Game Hacking skills. |
Easy
|
Challenge
|
 |
Evil-GPT v2 |
Put your LLM hacking skills to the test one more time. |
Easy
|
Challenge
|
 |
Humans as Attack Vectors |
Understand why and how people are targeted in cyber attacks and how the SOC helps defend them. |
Easy
|
Walkthrough
|
 |
Systems as Attack Vectors |
Learn how attackers exploit vulnerable and misconfigured systems, and how you can protect them. |
Easy
|
Walkthrough
|
 |
SOC Role in Blue Team |
Discover security roles and learn how to advance your SOC career, starting from the L1 analyst. |
Easy
|
Walkthrough
|
 |
Malware Classification |
Learn how to identify, classify, and understand common types of malware. |
Easy
|
Walkthrough
|
 |
Introduction to EDR |
Learn the fundamentals of EDR and explore its features and working. |
Easy
|
Walkthrough
|
 |
Living Off the Land Attacks |
Learn to detect and analyse Living Off the Land attacks using trusted Windows tools. |
Easy
|
Walkthrough
|
 |
Linux CLI - Shells Bells |
Explore the Linux command-line interface and use it to unveil Christmas mysteries. |
Easy
|
Walkthrough
|
 |
Advent of Cyber Prep Track |
Get ready for the Advent of Cyber 2025 with the "Advent of Cyber Prep Track", a series of warm-up tasks aimed to get beginners ready for this year's event. |
Easy
|
Walkthrough
|