Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • Live Training
    • Live Training Calendar
    • Course Catalog
    • Pay What You Can Training
    • Training Roadmap
    • Cybersecurity Training for Businesses
    • The Vault Program
  • On-Demand Training
    • Course Catalog
    • Training Roadmap
    • Cybersecurity Training for Businesses
    • MSP Training
    • The Vault Program
  • Cyber Range
    • About Our Cyber Range
    • Purchase Subscription
    • ACE-T™ Certification
    • ACE-T™ Level Lookup
  • About
    • Mission
    • FAQ
    • Giving Back
    • Our Instructors
    • Testimonials
    • Updates
  • Contact Us
  • Toggle search form

Antisyphon Cyber Range: A Modicum of Miscellany

Posted on March 15, 2023March 14, 2023 By

Hey everybody!

Here we are, at the Ides of March! In Ancient Rome, this would be a holiday, although the assassination of Julius Caesar in 44 BC did kinda put a damper on things. Luckily, we have four more Cyber Range challenges for you to enjoy. The selection is kind of random, but so are we, so it’s all good!

For screenshots and descriptions of this week’s additions, see below.

Good luck and have fun!
The Cyber Range Team

P.S. If you’re not already signed up for the BHIS Antisyphon Cyber Range, the following page has screenshots, info, and, of course, a link where you can sign up and join in the fun:

https://www.antisyphontraining.com/cyber-range/


Welcome to the Penetration Testing Team! We are happy that you're joining us. Our team focuses on testing the security of web-applications, networks, and other computer systems to find and exploit vulnerabilities or bugs in the systems.
Oh, goody! Trivial Pursuit!
Hi there! I recently signed a lease for an apartment, but the landlord seemed to be in such a hurry to leave the city, that they forgot to give me any of the keys! After getting all the doors re-keyed I found this device outside. It has a keyhole, but I don't have the key. What would the replacement key look like (numerically)?
How unique are the keys for these things, anyway?
A client has hired you to perform a forensics investigation on a machine they recovered in a recent operation, and you've come across this file. At first glance, it looks like a colorful compilation of letters and numbers. Can you figure out what they could mean?
Letters and numbers and colors… Oh, my!
You managed to get access to a device (indicated in red) on the network shown below. One of the hosts on that network is sending the flag over HTTPS to another host every ~5 seconds. Can you intercept it?
I think I need to map things out…

Cyber Range Updates Tags:Cyber Range Updates

Post navigation

Previous Post: Antisyphon Cyber Range: Crypto Carnival
Next Post: Antisyphon Cyber Range: Easy Peasy, Mostly 😉
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme