LetsDefend: Linux Disk ForensicsThis is a hard-difficulty challenge that requires us to analyze the disk image of a compromised linux system. We'll analyze various Linux system files and log files to gather the required information.2024-07-19
BlueTeamLabs: DoctorInvestigate a compromised web server and determine what vulnerabilities were exploited by the attacker and what actions they performed.2024-07-17
BlueTeamLabs: Total RecallFor this challenge we are tasked with using Redline to conduct memory analysis of a compromised host.2024-07-17
NICE: Disguising Dastardly DeedsFor this challenge we are tasked with decrypting a ZIP that contains exfiltrated data.2024-07-14
LetsDefend: Malicious WordPress PluginThis is a medium-difficulty challenge that requires the analysis of a pcap to determine the source of a compromise and actions performed by the attacker.2024-07-12
NICE: Foolish Firewall ConfigurationsThis challenge requires configuring firewalls on multiple devices.2024-06-29
NICE: Linux Administration 201In this NICE challenge, we are tasked with configuring network interfaces, DNS, Active Directory services, and account provisioning.2024-06-09
NICE: Linux Administration 101: Users, Access & UpdatesFor this challenge we are tasked with creating user accounts, assigning privileges, updating apache, and configuring SSH.2024-06-02
CCD ReviewCertified CyberDefender is an intermediate certification course on CyberDefender’s platform. The course covers SOC fundamentals, incident response, digital forensics (network, memory, disk), and threat hunting. The exam is a 48-hour practical covering each domain of the course except for incident response.2023-07-11
CyberDefenders: Elastic-CaseElastic-Case is a medium-difficulty challenge hosted by CyberDefenders. It involves using Elastic as a SIEM to trace malicious activity on a compromised network.2023-06-15