Advanced Configuration Lab  · On-demand

Cyber Range - 7H3_!NF3KT!0N_C0R3

Solution overview

Type: Blue Team

Who Should Play: Anyone with experience in reverse engineering, malware analysis, or reading assembly. If you enjoy solving problems and digging for clues, this is for you!

Objective: The Infection Core CTF will test your blue teaming ability through challenges that focus on malware analysis, reverse engineering, memory forensics, cryptanalysis, and more. 
You've been called into work last minute - the autonomous cyber weapons division has had an emergency. One of their most developed projects, SHIVR, has gained sentience and escaped onto the public web. This is a massive threat to our own infrastructure given what SHIVR is capable of. You and a few other analysts have been tasked with tracking down SHIVR and ultimately neutralize this threat. Beware, SHIVR knows we'll be coming for it.

Why It Matters: Reverse engineering skills are critical for uncovering hidden logic, analyzing malware, and understanding proprietary or obfuscated software. In real-world security operations, these capabilities help defenders detect advanced threats and help red teams craft realistic attack simulations. This game challenges players to go beyond surface-level analysis, reinforcing the importance of low-level knowledge and persistence when dealing with complex binaries.

How to Get Started:

  1. Watch the introduction video from Willa below
  2. Click the "Launch Lab" icon on the right-hand column of this page to launch the game space and access your Player Desktop
  3. Double-click the "readme.txt" file on your Player Desktop for further instructions

 

IMPORTANT MESSAGE FROM WILLA:

Loading