An cyberattack is right around the corner—does your team know what it will look like or how to respond? Test your team's abilities and your system's configuration!

This category includes capture-the-flag exercises, defacement exercises, and red team / blue team exercise environments to pit your team members against each other. All scenarios include active monitoring so you know how far you've gotten!

 

The Attack & Defense Scenarios are currently available only as packages from the CYRIN Utility Industry Site.

Questions about which exercise is right for you? Contact cyrin@atcorp.com.

Hone your skills and see how an attacker would exploit configuration weaknesses. This Capture the Flag (CTF) scenario lets you see first-hand an attacker's strategies for compromising your systems. Can you gain total control over a target system solely via a web application?

Build on your skills from the first CTF scenario with a new web server setup—can you gain root access on this box?