Hands-On Lab Workshop: Infection Core
Event Overview
Join us for an immersive, hands-on Capture the Flag (CTF) experience designed for blue team enthusiasts and cybersecurity professionals. The Infection Core lab challenges you to track, contain, and neutralize SHIVR, an autonomous cyber weapon that has escaped onto the public web. Through a series of malware analysis, reverse engineering, memory forensics, and cryptanalysis challenges, you’ll develop and test your skills in real-world scenarios. This lab goes beyond surface-level analysis, pushing you to uncover hidden logic and defend critical infrastructure against advanced threats.
Featured Speakers
What to expect
- • CTF Gameplay: Engage in a thrilling blue team adventure, solving challenges that simulate real-world cyber emergencies.
- • Scenario: SHIVR has gained sentience and poses a threat to infrastructure. Your mission is to track its escape route and neutralize the threat.
- • Skills Development: Strengthen your expertise in reverse engineering, malware analysis, and low-level forensics.
- • Interactive Q&A: Collaborate with WWT experts and fellow participants during live discussion segments.
- • Guided Lab Experience: Access a Kali Linux VM pre-configured with essential security tools, and follow step-by-step instructions via the Player Desktop.
Goals and Objectives
• Learn to recognize and analyze the implications of specific malware behaviors. • Develop confidence in reverse engineering and mitigating malicious software. • Gain hands-on experience with memory forensics and cryptanalysis. • Reinforce the importance of persistence and low-level technical knowledge in cyber defense. • Practice blue team techniques to defend against autonomous threats in a controlled, gamified environment.
Who should attend?
This lab is ideal for: • Security operations center (SOC) analysts • Incident responders • Malware analysts • Reverse engineers • IT professionals seeking to upskill in blue team techniques • Anyone with experience in reverse engineering, malware analysis, or reading assembly code. If you enjoy solving problems and digging for clues, this lab is for you No prior experience required; suitable for all skill levels, but especially valuable for those looking to deepen their technical expertise in cyber defense.