Cyber Defenders digital forensics challenges

What is it?

Hands-on labs mimicking real breach investigations (memory dumps, disk images, network traces).

Why try them?

  • Realistic evidence: Work with actual attack artefacts.

  • Guided learning: Hints keep you from hitting dead ends.

  • Community answers: See how others solved the same puzzle.

Typical challenge:

“This ransomware encrypted files—find the attacker’s Bitcoin wallet in the memory dump.”

How to do them?


Last update: 2025-06-07 06:04