Shopping Cart

No products in the cart.

Antisyphon Cyber Range: Spring Potpourri

As cyber defense capabilities increase, the malware they defend against does as well. A large number of malware scanners function by looking for common executable files and scanning them for malicious code. Some malware tries to evade this by using a custom executable format unknown to malware scanners. We suspect that there is a well known cryptocurrency miner on some of our computers here at C3 using such a format. We want to configure our malware scanners to detect this! We need the first four bytes (the magic bytes) of this executable format. The flag will be the four bytes in hex with spaces separating them (for example, "4A 5C 05 00").

Hey everybody!

This week’s challenges are comparatively easy, and they cover everything from binary exploits to recon. In that, they are kind of like potpourri. They are light and varied and guaranteed to brighten up the room. 🌼

For screenshots and descriptions of this week’s additions, see below.

Good luck and have fun!
The Cyber Range Team

P.S. If you’re not already signed up for the BHIS Antisyphon Cyber Range, the following page has screenshots, info, and, of course, a link where you can sign up and join in the fun:

https://www.antisyphontraining.com/cyber-range/