Rooms

Explore our collection of hands-on cybersecurity challenges

Networking Concepts

Networking Concepts

Master the fundamental concepts of computer networking including the ISO OSI model and TCP/IP protocol suite. This room provides a comprehensive introduction to how networks function.

2 tasks
Easy
Networking Essentials

Networking Essentials

Dive deeper into essential networking protocols and learn how data travels from source to destination. Explore automatic configuration, packet routing, and the protocols that make modern networks function seamlessly.

2 tasks
Easy
Networking Core Protocols

Networking Core Protocols

Master the core protocols that power the internet. This room covers TCP, UDP, ICMP, and other fundamental protocols that enable communication across networks. Learn how these protocols work together to ensure reliable data transmission.

2 tasks
Medium
Networking Secure Protocols

Networking Secure Protocols

Learn how to secure network communications using modern encryption and tunneling protocols. This room covers TLS/SSL for secure web traffic, SSH for remote administration, and VPN technologies for creating secure tunnels over untrusted networks.

3 tasks
Medium
Wireshark: The Basics

Wireshark: The Basics

Master the fundamentals of packet analysis using Wireshark, the world's most popular network protocol analyzer. Learn how to capture live network traffic, analyze protocols, and investigate PCAP files to understand network behavior and identify security issues.

3 tasks
Easy
Tcpdump: The Basics

Tcpdump: The Basics

Learn the essential command-line packet analyzer used by security professionals worldwide. This room teaches you how to capture network packets, apply filters to find specific traffic, and save captures for later analysis. Perfect for analyzing network traffic directly on servers and network devices.

3 tasks
Easy
Nmap: The Basics

Nmap: The Basics

Master Nmap, the industry-standard network scanning tool used by security professionals for network discovery and security auditing. Learn how to discover live hosts, enumerate open ports, detect running services, and identify operating systems on target systems.

3 tasks
Medium
OWASP Top 10

OWASP Top 10

Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.

20 tasks
Easy