Jeopardy-style CTF
Raise information security awareness in the form of a competition. Train your teams to cope with cyber risks effectively in an environment enjoyable and suitable for promoting interaction.
MALICE Events provides offensive security challenges on all types of technologies. We organize various events to train and familiarize the participants to the most common vulnerabilities. Each challenge gives a realistic situation which helps understand the impact of each flaw.
Have some sections or subsidiaries of your company get together to take advantage of the exercises designed for all levels, including both beginners and specialists.
Make your teams aware of all types of cyber risks
The challenges proposed by MALICE Events examine all the skills in computer security. They encourage the practice of offensive security techniques so that your teams can better understand how an attack is launched, how much impact it may cause, and how they can protect themselves effectively from such an incident.
We have a catalog of challenge which are immediately available, and if necessary we can also develop new challenge exercises according to the risks specific to your business.
Try it yourself
Log in to the following website interface to earn 50 points. The service has an SQL injection on the login page. Enter the user name ' OR 1=1;--
to access the administration interface and get the flag!
Description
I found this application on the Internet, but I don’t know what it hides. Can you connect to it?
Details
- Points
- 50
- Category
- Web
- Validations
- 5
- Url
- http://demochallenge.chall.malicecyber.com/
Attachments
This challenge has no Attached Files.
On-site or Online Competition
Our Jeopardy-style CTF is generally made up of a dozen of challenges, and it takes a whole day to complete them. We can organize them on site or remotely for more flexibility.
The public dashboard allows each team to track their progress and see the scores of the competing teams.
Trials for all levels
It is not just about training the technicians but about having the teams work together by involving the staff of all levels. The challenges are divided into categories and sorted according to the difficulty so that each team member can participate depending on his ability and interest. The participants can play either alone or on a team.
Dividing tasks within the teams and organizing them well are the principal criteria to be evaluated in order to ensure the company’s effectiveness in responding to cyber threats.