
Setup Kali Linux Homelab on MacOS
This blog is for anyone who love hacking and don’t know how to set up a virtual machine lab. We have 2 options: VMware and VirtualBox. Unfortunately, VirtualBox does not support on Macbook, so we...

This blog is for anyone who love hacking and don’t know how to set up a virtual machine lab. We have 2 options: VMware and VirtualBox. Unfortunately, VirtualBox does not support on Macbook, so we...

CHALLENGE DESCRIPTION Last night, most employees’ mobile devices were compromised, putting them at significant risk of leaking personal and private information. We require your expertise in digital...

CHALLENGE DESCRIPTION NeuroSync™ is a leading suite of products focusing on developing cutting edge medical BCI devices, designed by the Korosaki Coorporaton. Recently, an APT group targeted them a...

CHALLENGE DESCRIPTION Our SIEM alerted us to a suspicious logon event which needs to be looked at immediately . The alert details were that the IP Address and the Source Workstation name were a mis...

CHALLENGE DESCRIPTION Talion suspects that the threat actor carried out anti-virtualization checks to avoid detection in sandboxed environments. Your task is to analyze the event logs and identify ...

CHALLENGE DESCRIPTION Byte Doctor Reyes is investigating a stealthy post-breach attack where several expected security logs and Windows Defender alerts appear to be missing. He suspects the attacke...

CHALLENGE DESCRIPTION As a digital forensics investigator, you received an urgent request from a client managing multiple proxy Kubernetes clusters. The client reports unusual behavior in one of th...

CHALLENGE DESCRIPTION You’ve completed Training Day — congrats, rookie. Now the real game begins. An unmarked binary just landed on your desk. It’s acting shady, tripping a few alarms, but no one’s...

CHALLENGE DESCRIPTION A fresh new day, a well-rested cybersecurity professional—ready to learn something new after a chaotic week. Scrolling through challenges, they stumble upon TrainingDay, downl...

CHALLENGE DESCRIPTION A major incident has recently occurred at Forela. Approximately 20 GB of data were stolen from internal s3 buckets and the attackers are now extorting Forela. During the root ...