π©Disarm Me CTF: Hack, Decrypt, Disable
Event Overview
This red teamβstyle CTF puts your team in the role of attackers breaking into an emulated internal network. Youβll play as contracted gray-hat operatives (SAVE) infiltrating The League β a shadowy collective behind ransomware and extortion campaigns β to recover intelligence and disrupt their plans. Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights. What youβll practice: π Attacker tradecraft β reconnaissance, exploitation, persistence. π§ Adversary tool fluency β exposure to real-world tools and methods. π€ Critical thinking & communication β operate as a focused squad under timed pressure. ποΈ Side quests & extra intelligence β optional objectives that surface richer findings for your organization.
What to expect
- Frameworks β Metasploit
- Post-exploitation β Meterpreter
- SQL vulnerability detection/exploitation β SQLmap
- Web Reconnaissance/Exploitation β Burp Suite
- Directory/File enumeration β Dirbuster, Wfuzz
- DNS enumeration β Fierce, DNSrecon
- Password Cracking β John-the-Ripper, Hashcat
- Network Reconnaissance β NMAP
- Steganography β Steghide
- Reverse-Engineering β Ghidra, GDB, Strings
Goals and Objectives
Points are awarded for completing challenges, covertly breaking into The Leagueβs network, and collaborating with your team to obtain the final passphrase. Expect a mix of core objectives and optional targets that add extra scoring and intelligence for your organization. π¨ Practice realistic incident scenarios without risk to production systems π€ Improve team coordination β align roles and communication under timed pressure π Surface skill & process gaps to inform future training and investments π Generate actionable insights that support tabletop exercises, IR playbooks, and stakeholder reporting
Who should attend?
This CTF is designed for technical teams who want hands-on offensive experience and for leaders who need clear takeaways about attacker behavior and organizational readiness. π΅οΈ Red teamers & penetration testers β sharpen exploitation technique and tool usage π‘οΈ Incident responders & SOC analysts β learn attacker steps to improve detection and containment strategies βοΈ Security architects & engineers β see how design choices may be exploited and identify defensive hardening opportunities π CISOs & security managers β observe attacker behavior firsthand and gather evidence to inform risk decisions and investment cases π¬ Researchers & ethical hackers β test theory in a high-fidelity, scenario-based environment