Gameplay
Our Cyber Range features both Red Team and Blue Team Capture the Flag (CTF) events, as well as various characters who provide hints and guidance throughout the game. In Red Team scenarios, participants work together to break into internal networks, emulating the actions of real-world hackers; Blue Team scenarios focus on defending against attacks using the latest cybersecurity technologies.
Scenarios
Step into the future of Endpoint Detection and Response with our latest game based on CrowdStrike EDR. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology.
Objective
Successfully complete all three phases: Reconnaissance and discovery, Patching and remediation and real time defending.
Logistics
10 teams of 3-4 players
Difficulty
Intermediate
Run time
6 Hours
Who should play
Teams who need training on Blue Team tactics, SOC, IR Specialists and Infrastructure Engineers, Cyber Engineers and Cyber Architects, teams looking to up level their skill sets and build ways of working together.
This is a red team-style mixed capture the flag event that will require you and your team to actively break into an internal network as if you were a hacker. Put on your big kid pants, 'cause this is big time!
Objective
Assemble a team capable of breaking into an internal network as if you were a hacker. Points will be awarded for completing challenges, covertly breaking into The League's network and working collaboratively with your team to obtain the passphrase.
Logistics
20 teams of 3-4 players
Difficulty
Intermediate
Run time
8 Hours
Who should play
Red team members and offensive security specialists, Penetration testers, security researchers and ethical hackers, Incident responders, CISOs and security managers, Security and network architects, engineers and administrators and Professionals responsible for physical and information security
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss!
Objective
Assemble a team capable of entering Zeta's network, identify all the indicators of compromise and mitigate the threat by eliminating Leopold's foothold in the network.
Logistics
15 teams of 3-4 players
Difficulty
Intermediate
Run time
6 Hours
Who should play
Teams who need training on Blue Team tactics, SOC, IR Specialists and Infrastructure Engineers, Cyber Engineers and Cyber Architects, teams looking to up level their skill sets and build ways of working together.
This Capture the Flag (CTF) Demo called "Initiation" is meant to introduce you to the WWT Cyber Range platform. Consider this the tutorial level for our CTF events. You will be introduced to the features and functionality of WWT Cyber Range CTFs as well as be provided with tips for success in future events.
Objective
All the challenges within this CTF are beginner-level, and the game will guide you through completion. This game will only take about an hour to complete and contains both red team (attacker) and blue team (defender) challenges.
Logistics
1 player, launched on-demand
Difficulty
Beginner
Run time
1 hour or less
Who should play
Players registered for another WWT CTF, this is your initiation. Also designed for entry-level security analysts or those transitioning into cybersecurity roles, students, IT specialists, network administrators, and system administrators, Individuals who have a keen interest in cybersecurity but may not yet have formal training or experience in the field
In this Capture the Flag (CTF), codenamed "CH3M1C41_SP1LL (Chemical Spill)", your red-team skills will be put to the test within an Operational Technology (OT) environment. SAVE, an elite gray hat hacking organization, has intercepted a paper trail indicating The League has invested billions of dollars in a secret manufacturing facility in the heart of an industrial complex. Analysis of the paper trail suggests The League is using the facility to develop bleeding-edge quantum computing microchips capable unraveling the encryption-based defense of nearly every company globally and opening a new era of cyber attacks on behalf of The League and its rogue state partners.
Objective
Using a foothold in the network of the microchip plant established by SAVE operatives, your team must shut down a plant process which produces a chemical vital to manufacturing the microchips. This will halt production temporarily until more permanent measures can be taken. You will need to solve challenges ranging from network discovery, web application attacks, password cracking, and malicious modbus command injection.
Logistics
1 player, launched on-demand
Difficulty
Intermediate
Run time
5 hours
Who should play
IT/OT security personnel, SOC analysts, red teams, pen testers.
Coming soon!
Threat intel indicates that the APT known as the SpiceWorm team is targeting record labels with advanced ransomware campaigns. As a member of SAVE, you have been brought in to help Caladan Records prepare/detect/contain/recover their environment from imminent attack using Rubrik Security Cloud and master cyber resiliency.
Objective
Prepare the environment for ransomware attack by establishing proper application recovery plans. Help the SOC detect and analyze the attack using threat hunting and IR tools. Contain, eradicate and recover using Rubrik's Cyber Resiliency platform. Perform post-incident activity to report to the board regarding the incident.
Logistics
10 teams of 3-4 players
Difficulty
Intermediate
Run time
4-6 hours
Who should play
Teams who need training on Blue Team tactics, SOC, IR Specialists and Infrastructure Engineers, Cyber Engineers and Cyber Architects, teams looking to up-level their skill sets and build ways of working together
OEMs
Rubrik
Tools
Rubrik Security Cloud, Wireshark, Ghidra, Yara
Characters you'll meet
In our CTF games, you need to be familiar with the characters in the story as they can hurt or help your team! Here is a bit of information about each character.
DIDAS
DIDAS is a special artificial intelligence bot that has been deployed on thousands of missions like these to help mitigate hacker threats and attacks. Think of DIDAS as an AI bot that can help you and your team. This loveable robot will give out hints and directions throughout the game through Rocket Chat within the gamespace.
WILLA
WILLA is a Security Operations Center senior director for SAVE, an elite ethical hacking organization that was hired by Iron Guardian to help with the breach. WILLA is the conduit between Iron Guardian's senior officials, your team, and Mal and her hacker team "The League". WILLA provides directions, updates, and some hints in terms of the overall flow of the game.
Mallory Mendacious, alias Mal
She is the leader of the hacker group "The League". She will communicate with you and your team in Rocket Chat, and most likely continue to taunt you through the entire game. She is interested in acquiring the ransom money from Iron Guardian and will continue to intimidate you and your team to get you to pay.