An cyberattack is right around the corner—does your team know what it will look like or how to respond? Test your team's abilities and your system's configuration!

This category includes capture-the-flag exercises, defacement exercises, and red team / blue team exercise environments to pit your team members against each other. All scenarios include active monitoring so you know how far you've gotten!


The Attack & Defense Scenarios are currently available only as packages from the CYRIN Utility Industry Site.

Questions about which exercise is right for you? Contact

Hone your skills and see how an attacker would exploit configuration weaknesses. This Capture the Flag (CTF) scenario lets you see first-hand an attacker's strategies for compromising your systems. Can you gain total control over a target system solely via a web application?

Build on your skills from the first CTF scenario with a new web server setup—can you gain root access on this box?