Hands-On Lab Workshop: Infection Core

Event Overview

Join us for an immersive, hands-on Capture the Flag (CTF) experience designed for blue team enthusiasts and cybersecurity professionals. The Infection Core lab challenges you to track, contain, and neutralize SHIVR, an autonomous cyber weapon that has escaped onto the public web. Through a series of malware analysis, reverse engineering, memory forensics, and cryptanalysis challenges, you’ll develop and test your skills in real-world scenarios. This lab goes beyond surface-level analysis, pushing you to uncover hidden logic and defend critical infrastructure against advanced threats.

Brandon Swagman

World Wide Technology

Practice Manager

I am part of WWT’s Advanced Technology Center (ATC) Solution Development team focused on infrastructure technologies. We create and sustain high-qu...
Emily Brouillet

World Wide Technology

Cyber Range Engineer I

Emily is a Cyber Range Engineer at WWT.

What to expect

This is what you can expect from this Lab Workshop:
  • • CTF Gameplay: Engage in a thrilling blue team adventure, solving challenges that simulate real-world cyber emergencies.
  • • Scenario: SHIVR has gained sentience and poses a threat to infrastructure. Your mission is to track its escape route and neutralize the threat.
  • • Skills Development: Strengthen your expertise in reverse engineering, malware analysis, and low-level forensics.
  • • Interactive Q&A: Collaborate with WWT experts and fellow participants during live discussion segments.
  • • Guided Lab Experience: Access a Kali Linux VM pre-configured with essential security tools, and follow step-by-step instructions via the Player Desktop.

Goals and Objectives

• Learn to recognize and analyze the implications of specific malware behaviors. • Develop confidence in reverse engineering and mitigating malicious software. • Gain hands-on experience with memory forensics and cryptanalysis. • Reinforce the importance of persistence and low-level technical knowledge in cyber defense. • Practice blue team techniques to defend against autonomous threats in a controlled, gamified environment.

Who should attend?

This lab is ideal for: • Security operations center (SOC) analysts • Incident responders • Malware analysts • Reverse engineers • IT professionals seeking to upskill in blue team techniques • Anyone with experience in reverse engineering, malware analysis, or reading assembly code. If you enjoy solving problems and digging for clues, this lab is for you No prior experience required; suitable for all skill levels, but especially valuable for those looking to deepen their technical expertise in cyber defense.