Categories
missions

Cryptogeddon Mission Pack 4: Mobile Chop Shop

We have recovered an Android smartphone that belongs to an organized crime member who goes by the name Joe “The Fence” Arduino. Joe, and at least two other unknown individuals, were recently involved in the theft of a large volume of electronic equipment from a large electronics superstore. Joe’s Android phone is the only evidence […]

Categories
missions news

Cryptogeddon Mission Pack 4: Mobile Chop Shop is now available!

Folks, I must apologize for the long delay in launching Mission Pack 4. The last two months have been filled with various personal issues that have kept me from focusing on getting this Mission Pack out to you. And for that, I am truly sorry. But rest easy. Cryptogeddon Mission Pack 4: Mobile Chop Shop […]

Categories
missions

Cryptogeddon Mission Pack 3: The Rogue CSEC Agent (Sector 2013 Edition)

Created for and presented at SecTor 2013 (Canada’s Premier IT Security Conference), Cryptogeddon Sector 2013 Edition offers Cryptogeddon’s most involved infosec mission yet. A  Communications Security Establishment Canada (CSEC) cybersecurity analyst has gone rogue. He has taken a large cache of top secret files that include the names and identities of several secret agents working in foreign […]

Categories
missions

Cryptogeddon Mission Pack 2: Protect SCADA Secrets

Authorities recently discovered that foreign militants are in possession of North American public infrastructure plans, focusing primarily on supervisory control and data acquisition (SCADA) systems. The documentation includes architectural and system drawings, security assessments and vulnerability reports. Intelligence indicates that bloggers are prepping the public release of this information and that they will be encouraging […]

Categories
missions

Cryptogeddon Mission Pack 1: Detect the Mole

SpaceWay Aeronautics believes they have been hacked. They suspect that foreign competitors have access to the blueprints for their next generation space vehicle. You need to verify their suspicions by finding the files, the method of transmission and the employee(s) responsible for doing this. SpaceWay suspects that one of their servers was compromised due to […]