Skip to main content

Advent of Cyber 2025


About

Campaign Overview Setting: Wareville, home of The Best Festival Company (TBFC) Event: SOCMAS - th...

Prep Track

Get ready for the Advent of Cyber 2025 with the "Advent of Cyber Prep Track", a series of warm-up...

Side Quests

Linux CLI - Shells Bells

Day 1 Explore the Linux command-line interface and use it to unveil Christmas mysteries.

Phishing - Merry Clickmas

Day 2 Learn how to use the Social-Engineer Toolkit to send phishing emails.

Splunk Basics - Did you SIEM?

Day 3 Learn how to ingest and parse custom log data using Splunk.

AI in Security - old sAInt nick

Day 4 Unleash the power of AI by exploring it's uses within cyber security.

IDOR - Santa’s Little IDOR

Day 5 Learn about IDOR while helping pentest the TrypresentMe website.

Malware Analysis - Egg-xecutable

Day 6 Malware Analysis - Egg-xecutable Discover some common tooling for malware analysis within...

Network Discovery - Scan-ta Clause

Day 7 Discover how to scan network ports and uncover what is hidden behind them.

Prompt Injection - Sched-yule conflict

Day 8 Learn to identify and exploit weaknesses in autonomous AI agents.

Passwords - A Cracking Christmas

Day 9 Learn how to crack password-based encrypted files.

SOC Alert Triaging - Tinsel Triage

Day 10 Investigate and triage alerts through Microsoft Sentinel.

XSS - Merry XSSMas

Day 11 Learn about types of XSS vulnerabilities and how to prevent them.

Phishing - Phishmas Greetings

Day 12 Learn how to spot phishing emails from Malhare's Eggsploit Bunnies sent to TBFC users.

YARA Rules - YARA mean one!

Day 13 Learn how YARA rules can be used to detect anomalies.

Containers - DoorDasher's Demise

Day 14 Continue your Advent of Cyber journey and learn about container security.

Web Attack Forensics - Drone Alone

Day 15 Explore web attack forensics using Splunk.

Forensics - Registry Furensics

Day 16 Learn what the Windows Registry is and how to investigate it.

CyberChef - Hoperation Save McSkidy

Day 17 The story continues, and the elves mount a rescue and will try to breach the Quantum Fort...

Obfuscation - The Egg Shell File

Day 18 McSkidy keeps her focus on a particular alert that caught her interest: an email posing a...

ICS/Modbus - Claus for Concern

Day 19 Learn to identify and exploit weaknesses in ICS systems.

Race Conditions - Toy to The World

Day 20 Learn how to exploit a race condition attack to oversell the limited-edition SleighToy.

Malware Analysis - Malhare.exe

Day 21 Learn about malware analysis and forensics.

C2 Detection - Command & Carol

Day 22 Explore how to analyze a large PCAP and extract valuable information.

AWS Security - S3cret Santa

Day 23 Learn the basics of AWS enumeration.

Exploitation with cURL - Hoperation Eggsploit

Day 24 The evil Easter bunnies operate a web control panel that holds the wormhole open. Using c...