🚩Disarm Me CTF: Hack, Decrypt, Disable — Featuring Willa
Event Overview
This is a red team style capture the flag event that puts you and your team in the role of hackers trying to break into an emulated internal network. Assemble a team of 3 to 4 players ready to dig into vulnerabilities, decrypt systems, and disable key services before time runs out. This time, you’ll have Willa on your side. Willa is a new AI teammate built to guide you through the game with real-time tips, helpful insights, and resource suggestions. She can even flag a live proctor if something needs attention. Whether you're stuck on a flag or just need a nudge, Willa has your back. Get ready to think like an attacker, act fast, and work as a team.
What to expect
- Frameworks – Metasploit
- Post-exploitation – Meterpreter
- SQL vulnerability detection/exploitation – SQLmap
- Web Reconnaissance/Exploitation – Burp Suite
- Directory/File enumeration – Dirbuster, Wfuzz
- DNS enumeration – Fierce, DNSrecon
- Password Cracking – John-the-Ripper, Hashcat
- Network Reconnaissance – NMAP
- Steganography – Steghide
- Reverse-Engineering – Ghidra, GDB, Strings
Goals and Objectives
Points will be awarded for completing challenges, covertly breaking into The League's network and working collaboratively with your team to obtain the passphrase. Be on the lookout for a few extra flags along the way, too, that can add to your point value but aren't required to finish the game. There are several "side quests" riddled throughout the network that could prove useful for our Intelligence team. Report this information successfully and win more points!
Who should attend?
Red team members and offensive security specialists, Penetration testers, security researchers and ethical hackers, Incident responders, CISOs and security managers, Security and network architects, engineers and administrators and Professionals responsible for physical and information security