Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
A young woman works at her computer to unravel a digital mystery...

Antisyphon Cyber Range: Going in Reverse

Posted on August 30, 2023August 30, 2023 By

Hey everybody!

Reverse engineering malware is all about dissecting malicious software to unravel its inner workings, intent, and potential impact. This process helps security experts comprehend attack methods, develop countermeasures, and enhance cyber defenses. And guess what? That’s what this week’s release is all about!

For screenshots and descriptions of this week’s additions, see below.

A young woman works at her computer to unravel a digital mystery...
A young woman works at her computer to unravel a digital mystery…

Good luck and have fun!
The Cyber Range Team

P.S. If you’re not already signed up for the BHIS Antisyphon Cyber Range, the following page has screenshots, info, and, of course, a link where you can sign up and join in the fun:

https://www.antisyphontraining.com/cyber-range/


I've recently discovered a binary that was installed on my linux system, and I think it may be doing something malicious. Unfortunately, it is so obfuscated, and when I ran it in a sandbox, there was no output. Could you take a look at it and figure out what it is doing?
A mystery file that generates no output… tricky!
For better or worse, Active Directory is pretty much ubiquitous. As attackers and defenders, our job is to secure the various technology our organization is utilizing, and one of the best ways to do that is to dive really deep in the weeds of it to understand how it works.
Find the DN? Sounds like a treasure hunt!
My friend told me that there is something hidden in this program. I don't quite understand what he means by that... Can you help me figure it out?
What could possibly be hidden in a program?
Our team of biologist hackers have found a fascinating specimen that requires rare insights into the defining substance of everyone's favorite snakes in order to be understood. Unfortunately, our biologist hackers are way out of their depth. Can you help them out?
A biologist hacker? Who knew?!?
Cyber Range Updates, News Tags:Cyber Range Updates, Reverse Engineering

Post navigation

Previous Post: Ready for more Linux with Hal Pomeranz?!
Next Post: Join Kevin Johnson for class next week!
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme