🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa

Event Overview

This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out. This time, you’ll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back. Get ready to think like an attacker, act fast, and work as a team.

What to expect

Here's the sitch.... Thousands of organizations across the world are grappling with a new ransomware attack and a nefarious collective hackers called The League has taken credit and is demanding ransom. A group of those affected companies are fed up with the barrage of cyber threats and are fighting back. To do that, they've contracted with a gray hat hacking organization called SAVE to break into The League's network and spoil its plans and rattle their cages. Open source Tools utilized:
  • Frameworks – Metasploit
  • Post-exploitation – Meterpreter
  • SQL vulnerability detection/exploitation – SQLmap
  • Web Reconnaissance/Exploitation – Burp Suite
  • Directory/File enumeration – Dirbuster, Wfuzz
  • DNS enumeration – Fierce, DNSrecon
  • Password Cracking – John-the-Ripper, Hashcat
  • Network Reconnaissance – NMAP
  • Steganography – Steghide
  • Reverse-Engineering – Ghidra, GDB, Strings

Goals and Objectives

Points will be awarded for completing challenges, covertly breaking into The League's network and working collaboratively with your team to obtain the passphrase. Be on the lookout for a few extra flags along the way, too, that can add to your point value but aren't required to finish the game. There are several "side quests" riddled throughout the network that could prove useful for our Intelligence team. Report this information successfully and win more points!

Who should attend?

Red team members and offensive security specialists, Penetration testers, security researchers and ethical hackers, Incident responders, CISOs and security managers, Security and network architects, engineers and administrators and Professionals responsible for physical and information security