Gameplay

Our Cyber Range features both Red Team and Blue Team Capture the Flag (CTF) events, as well as various characters who provide hints and guidance throughout the game. In Red Team scenarios, participants work together to break into internal networks, emulating the actions of real-world hackers; Blue Team scenarios focus on defending against attacks using the latest cybersecurity technologies.

Scenarios

CrowdStrike – Falcon

Blue Team Game

Step into the future of Endpoint Detection and Response with our latest game based on CrowdStrike EDR. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.

Objective

Successfully complete all three phases: Reconnaissance and discovery, Patching and remediation and real time defending.

Logistics

10 teams of 3-4 players

Difficulty

Intermediate

Run time

6 Hours

Who should play

Teams who need training on Blue Team tactics, SOC, IR Specialists and Infrastructure Engineers, Cyber Engineers and Cyber Architects, teams looking to up level their skill sets and build ways of working together.

Disarm Me

Red Team Game

This is a red team-style mixed capture the flag event that will require you and your team to actively break into an internal network as if you were a hacker. Put on your big kid pants, 'cause this is big time!

Objective

Assemble a team capable of breaking into an internal network as if you were a hacker. Points will be awarded for completing challenges, covertly breaking into The League's network and working collaboratively with your team to obtain the passphrase.

Logistics

20 teams of 3-4 players

Difficulty

Intermediate

Run time

8 Hours

Who should play

Red team members and offensive security specialists, Penetration testers, security researchers and ethical hackers, Incident responders, CISOs and security managers, Security and network architects, engineers and administrators and Professionals responsible for physical and information security

Haystack

Blue Team Game

Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss!

Objective

Assemble a team capable of entering Zeta's network, identify all the indicators of compromise and mitigate the threat by eliminating Leopold's foothold in the network.

Logistics

15 teams of 3-4 players 

Difficulty

Intermediate

Run time

6 Hours

Who should play

Teams who need training on Blue Team tactics, SOC, IR Specialists and Infrastructure Engineers, Cyber Engineers and Cyber Architects, teams looking to up level their skill sets and build ways of working together.

Initiation

Mix of red and blue tactics

This Capture the Flag (CTF) Demo called "Initiation" is meant to introduce you to the WWT Cyber Range platform. Consider this the tutorial level for our CTF events. You will be introduced to the features and functionality of WWT Cyber Range CTFs as well as be provided with tips for success in future events.

Objective

All the challenges within this CTF are beginner-level, and the game will guide you through completion. This game will only take about an hour to complete and contains both red team (attacker) and blue team (defender) challenges.

Logistics

1 player, launched on-demand

Difficulty

Beginner

Run time

1 hour or less

Who should play

Players registered for another WWT CTF, this is your initiation. Also designed for entry-level security analysts or those transitioning into cybersecurity roles, students, IT specialists, network administrators, and system administrators, Individuals who have a keen interest in cybersecurity but may not yet have formal training or experience in the field

CH3M1C41_SP1LL

Red Team Game

In this Capture the Flag (CTF), codenamed "CH3M1C41_SP1LL (Chemical Spill)", your red-team skills will be put to the test within an Operational Technology (OT) environment. SAVE, an elite gray hat hacking organization, has intercepted a paper trail indicating The League has invested billions of dollars in a secret manufacturing facility in the heart of an industrial complex. Analysis of the paper trail suggests The League is using the facility to develop bleeding-edge quantum computing microchips capable unraveling the encryption-based defense of nearly every company globally and opening a new era of cyber attacks on behalf of The League and its rogue state partners.

Objective

Using a foothold in the network of the microchip plant established by SAVE operatives, your team must shut down a plant process which produces a chemical vital to manufacturing the microchips. This will halt production temporarily until more permanent measures can be taken. You will need to solve challenges ranging from network discovery, web application attacks, password cracking, and malicious modbus command injection.

Logistics

1 player, launched on-demand

Difficulty

Intermediate

Run time

5 hours

Who should play

IT/OT security personnel, SOC analysts, red teams, pen testers.

Coming soon!

Rubrik - Micdrop

Blue Team Game

Want to receive an exclusive invite once available?

Threat intel indicates that the APT known as the SpiceWorm team is targeting record labels with advanced ransomware campaigns. As a member of SAVE, you have been brought in to help Caladan Records prepare/detect/contain/recover their environment from imminent attack using Rubrik Security Cloud and master cyber resiliency.

Objective

Prepare the environment for ransomware attack by establishing proper application recovery plans. Help the SOC detect and analyze the attack using threat hunting and IR tools. Contain, eradicate and recover using Rubrik's Cyber Resiliency platform. Perform post-incident activity to report to the board regarding the incident.

Logistics

10 teams of 3-4 players

Difficulty

Intermediate

Run time

4-6 hours

Who should play

Teams who need training on Blue Team tactics, SOC, IR Specialists and Infrastructure Engineers, Cyber Engineers and Cyber Architects, teams looking to up-level their skill sets and build ways of working together

OEMs

Rubrik

Tools

Rubrik Security Cloud, Wireshark, Ghidra, Yara

Characters you'll meet

In our CTF games, you need to be familiar with the characters in the story as they can hurt or help your team! Here is a bit of information about each character.

DIDAS

DIDAS is a special artificial intelligence bot that has been deployed on thousands of missions like these to help mitigate hacker threats and attacks. Think of DIDAS as an AI bot that can help you and your team. This loveable robot will give out hints and directions throughout the game through Rocket Chat within the gamespace.

WILLA

WILLA is a Security Operations Center senior director for SAVE, an elite ethical hacking organization that was hired by Iron Guardian to help with the breach. WILLA is the conduit between Iron Guardian's senior officials, your team, and Mal and her hacker team "The League". WILLA provides directions, updates, and some hints in terms of the overall flow of the game.

Mallory Mendacious, alias Mal

She is the leader of the hacker group "The League". She will communicate with you and your team in Rocket Chat, and most likely continue to taunt you through the entire game. She is interested in acquiring the ransom money from Iron Guardian and will continue to intimate you and your team to get you to pay.