Categories
missions

Cryptogeddon Mission Pack 4: Mobile Chop Shop

Mission Cover - Mission Pack 4We have recovered an Android smartphone that belongs to an organized crime member who goes by the name Joe “The Fence” Arduino. Joe, and at least two other unknown individuals, were recently involved in the theft of a large volume of electronic equipment from a large electronics superstore.

Joe’s Android phone is the only evidence that we currently have.

Your assignment is to identify Joe’s accomplices and the inventory and distribution points for the stolen goods. We suspect that 3 local drop points exist in the Greater Toronto Area.

FIRST HACKERS CHALLENGE IS IN EFFECT:
Starting with Mission Pack 4, Cryptogeddon is challenging participants to solve the mission pack without the solution. Participants have 1 week from the time this mission pack is released to complete the mission pack. After the first week, the complete Mission Pack, including the solution, will be published. The first 3 participants to complete the mission pack in the first week will be included in this First Hackers section when the updated mission pack is released. Depending on the number of responses that I receive in the first week, I may adjust the final number of First Hackers that are included in this section.

And don’t worry – anyone that purchases the mission pack in the first week will receive a copy of the updated mission pack when it is released at no additional charge.

Additional info:
12 pages
Buy now: Amazon.com | Kobo

Categories
missions news

Cryptogeddon Mission Pack 4: Mobile Chop Shop is now available!

Mission Cover - Mission Pack 4Folks,

I must apologize for the long delay in launching Mission Pack 4. The last two months have been filled with various personal issues that have kept me from focusing on getting this Mission Pack out to you. And for that, I am truly sorry.

But rest easy. Cryptogeddon Mission Pack 4: Mobile Chop Shop is now available!

You can purchase your copy on Amazon.com. It’ll be available on Kobo shortly.

Mission Pack 4 brings with it some interesting new challenges:

We have recovered an Android smartphone that belongs to an organized crime member who goes by the name Joe “The Fence” Arduino. Joe, and at least two other unknown individuals, were recently involved in the theft of a large volume of electronic equipment from a large electronics superstore.

Joe’s Android phone is the only evidence that we currently have.

Your assignment is to identify Joe’s accomplices and the inventory and distribution points for the stolen goods. We suspect that 3 local drop points exist in the Greater Toronto Area.

Mobile virtual devices, social media stalking, password hacking, website monitoring and more await!

And, in a new twist, Cryptogeddon is introducing the concept of “First Hackers”:

Starting with Mission Pack 4, Cryptogeddon is challenging participants to solve the mission pack without the solution. Participants have 1 week from the time this mission pack is released to complete the mission pack. After the first week, the complete Mission Pack, including the solution, will be published. The first 3 participants to complete the mission pack in the first week will be included in this First Hackers section when the updated mission pack is released. Depending on the number of responses that I receive in the first week, I may adjust the final number of First Hackers that are included in this section.

And don’t worry – anyone that purchases the mission pack in the first week will receive a copy of the updated mission pack when it is released at no additional charge.

Congratulations to the Mini Challenge Winners:

Big congratulations to the winners of the first Cryptogeddon Mini Challenge. Several people were successful in solving the first mini challenge. One person has won a free copy of Mission Pack 4. And, the rest of the winners received an email earlier today as a head start (and a 4 hour discount) for Mission Pack 4. People that successfully cracked the Mini Challenge were asked to send me their favourite hacking movie and/or quote of all time. Here are some of the responses:

  • Wargames (Two people submitted this movie. The first person that submitted this one wins the free Mission Pack – check your email – it should be in your inbox!)
  • “There is no spoon.” (from The Matrix)
  • “There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. What we see and hear, how we work, what we think… it’s all about the information!” –Cosmo, from Sneakers
  • Whistler: “That was very good, Bish. Remind me to make you an honorary blind person.” (from Sneakers)

And, one person asked me, “Do these get harder?” We’ll have to see what i can do with future Mini Challenges.

So don’t delay. Pick up Cryptogeddon Mission Pack 4: Mobile Chop Shop today!

Todd

Categories
missions

Cryptogeddon Mission Pack 3: The Rogue CSEC Agent (Sector 2013 Edition)

Mission Cover - Mission Pack 3Created for and presented at SecTor 2013 (Canada’s Premier IT Security Conference), Cryptogeddon Sector 2013 Edition offers Cryptogeddon’s most involved infosec mission yet.

A  Communications Security Establishment Canada (CSEC) cybersecurity analyst has gone rogue. He has taken a large cache of top secret files that include the names and identities of several secret agents working in foreign countries. This rogue analyst has stowed these files on the internet in an encrypted format and he is now threatening to share the location of the files and the decryption keys with the public.

Earlier today, the CSEC cybersecurity analyst narrowly avoided capture at a local cyber cafe, but during his escape, he left behind a USB drive, which contained our only clues thus far:

  • files.zip

We suspect that he was using the files on the USB drive to access his online data store.

Your assignment is to use the contents of the USB drive to recover the data cache and provide us with an inventory of the agent identities so that we can extract those agents before they are harmed.

NOTE: This mission requires the use of Amazon Web Services (AWS) EC2 and this mission is compatible with Amazon Web Services’ Free Tier.

Additional info:
24 pages
Buy now: Amazon.com | Kobo

Categories
missions

Cryptogeddon Mission Pack 2: Protect SCADA Secrets

Mission Cover - Mission Pack 2Authorities recently discovered that foreign militants are in possession of North American public infrastructure plans, focusing primarily on supervisory control and data acquisition (SCADA) systems. The documentation includes architectural and system drawings, security assessments and vulnerability reports. Intelligence indicates that bloggers are prepping the public release of this information and that they will be encouraging sleeper cells in various North American cities to carry out attacks on public infrastructure vulnerabilities that are outlined in the documents.

Intelligence indicates that the militants are working with the blog scadaplans.cryptogeddon.com.

Your assignment is to find the documents, extract them from the bloggers’ CMS before they are able to publish the documents online and identify the target infrastructure and their vulnerabilities so that they can be hardened against attack.

NOTE: This mission requires the use of Amazon Web Services (AWS) EC2 and this mission is compatible with Amazon Web Services’ Free Tier.

Additional info:
25 pages
Buy it now: Amazon.com | Kobo

Categories
missions

Cryptogeddon Mission Pack 1: Detect the Mole

Mission Cover - Mission Pack 1SpaceWay Aeronautics believes they have been hacked. They suspect that foreign competitors have access to the blueprints for their next generation space vehicle.

You need to verify their suspicions by finding the files, the method of transmission and the employee(s) responsible for doing this. SpaceWay suspects that one of their servers was compromised due to suspicious activity. They have provided an image of the server for you to analyze.

Your assignment is the analyze the machine and confirm SpaceWay’s suspicions. Assuming you find evidence of compromise, you are to identify the files that have been transmitted, identify the person(s) responsible for this breach and identify the destination of the files.

NOTE: This mission requires the use of Amazon Web Services (AWS) EC2 and this mission is compatible with Amazon Web Services’ Free Tier.

Additional info:
22 pages
Buy it now: Amazon.com | Kobo