by Ciberlac
The goal of this scenario is to familiarize participants with common offensive cybersecurity tasks focused on web enumeration, clue analysis, and logi...
by Grupo de Seguridad Informática, Uruguay
The aim of this scenario is to familiarize participants with common security issues in operating systems by performing offensive tasks such as reconna...
by Grupo de Seguridad Informática, Uruguay
WebGoat is a deliberately insecure application that allows interested developers to test vulnerabilities commonly found in Java-based applications tha...
| Name | Institution | Description | Types | Operating Systems | Platforms | Difficulty | Actions |
|---|---|---|---|---|---|---|---|
| Matrioska web | Ciberlac | The goal of this scenario is to familiarize participants with common offensive cybersecurity tasks focused on web enumeration, clue analysis, and logical exploitation, in order to discover a final FLAG hidden across multiple layers within a web server. Scenario adapted from the CTF Challenge Proposal for Universities, Telefonica TECH, by students and professors at the Technical University of the North, Ibarra, Ecuador. | Offensive | Linux | aws docker libvirt | Easy | |
| Password Cracking | Grupo de Seguridad Informática, Uruguay | The aim of this scenario is to familiarize participants with common security issues in operating systems by performing offensive tasks such as reconnaissance and password cracking. Trainees will be able to obtain insecure user credentials through brute-force attacks, eventually getting SSH access to a victim system. | Offensive | Linux | aws docker libvirt | Intermediate | |
| Webgoat | Grupo de Seguridad Informática, Uruguay | WebGoat is a deliberately insecure application that allows interested developers to test vulnerabilities commonly found in Java-based applications that use common and popular open source components. | Offensive | aws docker libvirt | Intermediate |