Categories
missions

Cryptogeddon Mission Pack 3: The Rogue CSEC Agent (Sector 2013 Edition)

Mission Cover - Mission Pack 3Created for and presented at SecTor 2013 (Canada’s Premier IT Security Conference), Cryptogeddon Sector 2013 Edition offers Cryptogeddon’s most involved infosec mission yet.

A  Communications Security Establishment Canada (CSEC) cybersecurity analyst has gone rogue. He has taken a large cache of top secret files that include the names and identities of several secret agents working in foreign countries. This rogue analyst has stowed these files on the internet in an encrypted format and he is now threatening to share the location of the files and the decryption keys with the public.

Earlier today, the CSEC cybersecurity analyst narrowly avoided capture at a local cyber cafe, but during his escape, he left behind a USB drive, which contained our only clues thus far:

  • files.zip

We suspect that he was using the files on the USB drive to access his online data store.

Your assignment is to use the contents of the USB drive to recover the data cache and provide us with an inventory of the agent identities so that we can extract those agents before they are harmed.

NOTE: This mission requires the use of Amazon Web Services (AWS) EC2 and this mission is compatible with Amazon Web Services’ Free Tier.

Additional info:
24 pages
Buy now: Amazon.com | Kobo

Categories
missions

Cryptogeddon Mission Pack 2: Protect SCADA Secrets

Mission Cover - Mission Pack 2Authorities recently discovered that foreign militants are in possession of North American public infrastructure plans, focusing primarily on supervisory control and data acquisition (SCADA) systems. The documentation includes architectural and system drawings, security assessments and vulnerability reports. Intelligence indicates that bloggers are prepping the public release of this information and that they will be encouraging sleeper cells in various North American cities to carry out attacks on public infrastructure vulnerabilities that are outlined in the documents.

Intelligence indicates that the militants are working with the blog scadaplans.cryptogeddon.com.

Your assignment is to find the documents, extract them from the bloggers’ CMS before they are able to publish the documents online and identify the target infrastructure and their vulnerabilities so that they can be hardened against attack.

NOTE: This mission requires the use of Amazon Web Services (AWS) EC2 and this mission is compatible with Amazon Web Services’ Free Tier.

Additional info:
25 pages
Buy it now: Amazon.com | Kobo

Categories
missions

Cryptogeddon Mission Pack 1: Detect the Mole

Mission Cover - Mission Pack 1SpaceWay Aeronautics believes they have been hacked. They suspect that foreign competitors have access to the blueprints for their next generation space vehicle.

You need to verify their suspicions by finding the files, the method of transmission and the employee(s) responsible for doing this. SpaceWay suspects that one of their servers was compromised due to suspicious activity. They have provided an image of the server for you to analyze.

Your assignment is the analyze the machine and confirm SpaceWay’s suspicions. Assuming you find evidence of compromise, you are to identify the files that have been transmitted, identify the person(s) responsible for this breach and identify the destination of the files.

NOTE: This mission requires the use of Amazon Web Services (AWS) EC2 and this mission is compatible with Amazon Web Services’ Free Tier.

Additional info:
22 pages
Buy it now: Amazon.com | Kobo