Cyber Range Updates

October 26, 2020

FIVE NEW PROBLEMS ADDED TO CYBER RANGE

Recently, the Cyber Range team added five new problems to the Cyber Range.

The first challenge addition is part 3 of the “Python Login Pannel” from the previous updates. In this challenge, the user is told that the web developer has gotten “smarter” and sets the challenge of gaining access once more.

The next challenge to be added is titled “Ransomeware Attack Part 1” and it tasks the user with trying to find out who is behind an “attack” on C3’s system by finding where the intruder hosted their ransomware from and finding a flag in the process.

Tune in next week for part 2 of this challenge!

The third challenge addition tasks the user with trying to get access to private API’s without paying for a subscription using a documentation for an API that only gives public API’s.

The fourth challenge asks the user to find “interesting things” within a “colorful” page in order to find the flag.

The fifth and final addition asks the user to help “read” a message that was typed up by a “friend” using a weird font.

Last but not least, the CyberRange team has created a challenge seeking the users feedback! The link to the “Feedback Survey” can also be found below!

You can find the survey here:
https://forms.office.com/Pages/ResponsePage.aspx?id=4tsbiXT46EaOT9cTFOVsjrQh-9aaOpRBs_rWm0xXEh5URFExVVA5QVhGR0Q3MjlEUkg2RkNKWkU5QS4u

Please be sure to tune back in every two weeks for five new challenges!


For more info or to get started on the Cyber Range, please visit https://www.blackhillsinfosec.com/services/cyber-range/.



September 23, 2020

FIVE NEW PROBLEMS ADDED TO CYBER RANGE

Recently, the Cyber Range team added five new problems to the Cyber Range.

The first challenge addition is part 2 of the “Python Login Pannel” from the last update. In this challenge, the user is tasked with finding the correct password to another version of a secure login.

Tune in to the next update for the 3rd and final part of this challenge!

The next challenge to be added tasks the user with analyzing a copy of the “malware” to recover a valid decryption password.

The third challenge addition tasks the user with trying to get the attention of the customer support of a company that a keyboard was purchased from.

The fourth challenge asks the user to find the original text of a “hash”, which in this case is encoded with the MD5 algorithm.

The fifth and final addition asks the user to help hackers figure out what to do with an “odd piece” of running software on an internal network.

Please be sure to tune back in every two weeks for five new challenges!


For more info or to get started on the Cyber Range, please visit https://www.blackhillsinfosec.com/services/cyber-range/.



September 3, 2020

FIVE NEW PROBLEMS ADDED TO CYBER RANGE

Recently, the Cyber Range team added five new problems to the Cyber Range.

The first challenge addition is the first of a 3-part challenge. “Python Login Pannel 1” gives the user some bytecode to a poorly programmed login portal and tasks them with finding the correct password.

Tune in to the next update for part 2 of this challenge!

The next challenge to be added tasks the user with using cryptography skills to decrypt a file and find out what is in it.

The third challenge addition asks the user to figure out what IP address that a piece of malware decodes to.

The fourth challenge asks the user to look at a file, find out what kind of file it is, and then open it.

The fifth and final addition asks the user to find a bypass to “unmotivated” security protections on a given website.

Please be sure to tune back in every two weeks for five new challenges!


For more info or to get started on the Cyber Range, please visit https://www.blackhillsinfosec.com/services/cyber-range/.



August 4, 2020

FIVE NEW PROBLEMS ADDED TO CYBER RANGE

Recently, the Cyber Range team added five new problems to the Cyber Range.

The first problem puts the user in the scenario of performing a physical penetration test where you have to pick a lock on an entrance to a facility:

The second problem tasks the user with connecting to a linux server and utilizing various techniques to elevate privileges to another user:

The third problem gives a task to find the flag in the root folder of a server using the link provided:

The fourth problem relates to cryptography and asks the user to decrypt the given message in order to find the flag:

The fifth and final problem tasks the user with finding the name of the type of encoding and then recovering the flag by scanning it:

Please be sure to tune back in every two weeks for five new challenges!


For more info or to get started on the Cyber Range, please visit https://www.blackhillsinfosec.com/services/cyber-range/.



July 20, 2020

Five New Problems Added to Cyber Range

Recently, the Cyber Range team added five new problems to the Cyber Range.

The first problem involves using da Vinci Crypto to reverse engineer a page to unlock a cryptex:

The second problem deals with web exploitation and focuses on finding glaring security mistakes on a website:

The third problem gives a link to a site full of binary where the user is supposed to find the flag:

The fourth problem relates to forensics and asks the user to analyze a “flash drive” to search for anything of interest:

The fifth and final problem concerns penetration testing and challenges the user to connect to a Linux server and elevate privileges to another user:

Please be sure to tune back in every two weeks for five new challenges!


For more info or to get started on the Cyber Range, please visit https://www.blackhillsinfosec.com/services/cyber-range/