In this exercise, the class is divided in two teams: the Red Team and the Blue Team. The Red Team is responsible for attacking and compromising a set of hosts, while the Blue Team is responsible for detecting the attacks and, in a limited form, for protecting the hosts. Read more.
Jeopardy-style Capture the Flag competitions usually involve multiple categories of problems, each of them contain a variety of questions of different point values. The teams are racing to be the first in solving the most number of points, but do not directly attack each other. Reverse-engineering, network sniffing, protocol analysis, system administration, penetration testing, programming, and cryptanalysis are some of the skills required. Read more.
Our expert security engineers are put to work for you as ethical hackers, conducting extensive analyse on your IT infrastructure. We are able to identify possible security breaches, information points of leakage or shutting down your service and create challenges that can use your real or virtual network in order to simulate real hacking mechanisms and approaches used by black hackers. Read more.