๐Ÿ”
CyberSleuth
search
Ctrlk
๐Ÿ”
CyberSleuth
  • ๐Ÿ Home Base
  • ๐Ÿ“„Onboarding
  • ๐Ÿ’ปDay 1
    • ๐Ÿ“‚Briefing
    • ๐ŸคCase 1: Locked Zip Files
    • ๐Ÿ•ธ๏ธCase 2: Scraping Websites
  • ๐Ÿ”‘Day 2
    • ๐Ÿ“‚Briefing
    • ๐Ÿ—๏ธCase 1: Starting from the Basics
    • ๐Ÿฅ—Case 2: Caesar Cipher (Not the Salad)
    • ๐Ÿ“šCase 3: Reading About the Book Cipher
  • ๐Ÿ”ŽDay 3
    • ๐Ÿ“‚Briefing
    • ๐Ÿ–ผ๏ธCase 1: What's in an Image?
    • ๐ŸคซCase 2: Secret, Secret, On the Wall
    • ๐Ÿ—ƒ๏ธCase 3: Files in Files
  • ๐Ÿ’ปDay 4
    • ๐Ÿ“‚Briefing
    • ๐ŸผCase 1: Pandamonium
    • ๐Ÿ›‘Case 2: Admins Only
    • ๐Ÿ’ฅCase 3: Imminent Disaster
    • ๐ŸŽญCase 4: Deception
  • ๐Ÿ•ต๏ธDay 5
    • ๐Ÿ“‚Briefing
    • ๐Ÿ˜ฎCase 1: Exposed Files
    • ๐Ÿ”“Case 2: Vulnerable People
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down

๐Ÿ Home Base

Welcome, agent! We've got a couple of cases in need of some help. We're dealing with technically sophisticated enemy groups that we'll need help taking down...

hashtag
Onboarding

Creating accounts and getting set up for your missions...

๐Ÿ“„Onboardingchevron-right

hashtag
Day 1

Introduction to Programming in Cybersecurity

๐Ÿ“‚Briefingchevron-right๐ŸคCase 1: Locked Zip Fileschevron-right๐Ÿ•ธ๏ธCase 2: Scraping Websiteschevron-right

hashtag
Day 2

Foundations of Cryptography

๐Ÿ“‚Briefingchevron-right๐Ÿ—๏ธCase 1: Starting from the Basicschevron-right๐Ÿฅ—Case 2: Caesar Cipher (Not the Salad)chevron-right๐Ÿ“šCase 3: Reading About the Book Cipherchevron-right

hashtag
Day 3

Forensics and Steganography

๐Ÿ“‚Briefingchevron-right๐Ÿ–ผ๏ธCase 1: What's in an Image?chevron-right๐ŸคซCase 2: Secret, Secret, On the Wallchevron-right๐Ÿ—ƒ๏ธCase 3: Files in Fileschevron-right

hashtag
Day 4

Weak Websites

๐Ÿ“‚Briefingchevron-right๐ŸผCase 1: Pandamoniumchevron-right๐Ÿ›‘Case 2: Admins Onlychevron-right๐Ÿ’ฅCase 3: Imminent Disasterchevron-right๐ŸŽญCase 4: Deceptionchevron-right

hashtag
Day 5

Linux & OSINT

๐Ÿ“‚Briefingchevron-right๐Ÿ˜ฎCase 1: Exposed Fileschevron-right๐Ÿ”“Case 2: Vulnerable Peoplechevron-right
NextOnboardingchevron-right