Hone your skills and see how an attacker would exploit configuration weaknesses. This Capture the Flag (CTF) scenario lets you see first-hand an attacker's strategies for compromising your systems. Can you gain total control over a target system solely via a web application?
Build on your skills from the first CTF scenario with a new web server setup—can you gain root access on this box?
Get experience conducting an internal investigation on a realistic corporate network.
You are a security officer for a shipping company whose trucks have repeatedly been hijacked by a criminal organization. The criminals appear to gave advance information on the route of the trucks, despite the company changing routes frequently. Company executives suspect someone within the company is leaking truck route information to the criminals. You have tasked with finding who is leaking the information, how and to whom.