๐Ÿ”
CyberSleuth
CtrlK
  • ๐Ÿ Home Base
  • ๐Ÿ“„Onboarding
  • ๐Ÿ’ปDay 1
    • ๐Ÿ“‚Briefing
    • ๐ŸคCase 1: Locked Zip Files
    • ๐Ÿ•ธ๏ธCase 2: Scraping Websites
  • ๐Ÿ”‘Day 2
    • ๐Ÿ“‚Briefing
    • ๐Ÿ—๏ธCase 1: Starting from the Basics
    • ๐Ÿฅ—Case 2: Caesar Cipher (Not the Salad)
    • ๐Ÿ“šCase 3: Reading About the Book Cipher
  • ๐Ÿ”ŽDay 3
    • ๐Ÿ“‚Briefing
    • ๐Ÿ–ผ๏ธCase 1: What's in an Image?
    • ๐ŸคซCase 2: Secret, Secret, On the Wall
    • ๐Ÿ—ƒ๏ธCase 3: Files in Files
  • ๐Ÿ’ปDay 4
    • ๐Ÿ“‚Briefing
    • ๐ŸผCase 1: Pandamonium
    • ๐Ÿ›‘Case 2: Admins Only
    • ๐Ÿ’ฅCase 3: Imminent Disaster
    • ๐ŸŽญCase 4: Deception
  • ๐Ÿ•ต๏ธDay 5
    • ๐Ÿ“‚Briefing
    • ๐Ÿ˜ฎCase 1: Exposed Files
    • ๐Ÿ”“Case 2: Vulnerable People
Powered by GitBook
Page cover
On this page

๐Ÿ Home Base

Welcome, agent! We've got a couple of cases in need of some help. We're dealing with technically sophisticated enemy groups that we'll need help taking down...

Onboarding

Creating accounts and getting set up for your missions...

๐Ÿ“„Onboarding

Day 1

Introduction to Programming in Cybersecurity

๐Ÿ“‚Briefing๐ŸคCase 1: Locked Zip Files๐Ÿ•ธ๏ธCase 2: Scraping Websites

Day 2

Foundations of Cryptography

๐Ÿ“‚Briefing๐Ÿ—๏ธCase 1: Starting from the Basics๐Ÿฅ—Case 2: Caesar Cipher (Not the Salad)๐Ÿ“šCase 3: Reading About the Book Cipher

Day 3

Forensics and Steganography

๐Ÿ“‚Briefing๐Ÿ–ผ๏ธCase 1: What's in an Image?๐ŸคซCase 2: Secret, Secret, On the Wall๐Ÿ—ƒ๏ธCase 3: Files in Files

Day 4

Weak Websites

๐Ÿ“‚Briefing๐ŸผCase 1: Pandamonium๐Ÿ›‘Case 2: Admins Only๐Ÿ’ฅCase 3: Imminent Disaster๐ŸŽญCase 4: Deception

Day 5

Linux & OSINT

๐Ÿ“‚Briefing๐Ÿ˜ฎCase 1: Exposed Files๐Ÿ”“Case 2: Vulnerable People
NextOnboarding