CMD+CTRL Cyber Range
The missing piece in your security training toolbag
Use as a practice range, run a competitive or awareness event, or manage talent
- Identify Rockstars. One client had someone from Finance join the security team after a competition.
- Find talent in remote areas. Fortune 300 outdoor apparel retailer in Maine recruits local college students.
- Improve collaboration. Blue-chip ISV runs monthly team events with a range specific to its cloud platform.
- Meet the hiring bar. Pen Testing broker uses real-time assessment capabilities to hire qualified contractors.
- Make training cool. The global brand ran 20+ tournaments worldwide after previous lackluster training.
Each had a waiting list and it won a coveted internal security award.
Meet our Ranges!
With ranges that vary in tech stacks and complexity, players become immersed in familiar environments and learn by doing (and having fun.)
Our flagship Cyber Range with Web and OWASP Top Ten challenges for all skill levels. Vulnerabilities range from basic cross-site scripting (XSS) to moderately complex Password Cracking and SQL injection (SQLi) attacks.
Beginner-level range with rich eCommerce functionality. Covers OWASP Top Ten, business logic attacks, known vulnerable software, Open Source Intelligence (OSINT) reconnaissance and others.
Beginner/intermediate-level range with a distinct employee, manager, and HR admin privileges. Heavy focus on data protection, escalation of privilege, vertical authorization attacks, and horizontal authorization attacks.
Beginner/Intermediate-level range that tempts you to uncover hidden data and access content you shouldn’t be able to. Features several APIs and includes advanced SQLi and path traversal attacks.
Intermediate-level range that includes poorly implemented mitigations (e.g. blacklisting and client-side validation) making exploits more challenging. Great for those who need to understand filter evasion, cryptography and advanced SQLi.
Intermediate/advanced-level modern Single Page Application (SPA) with a heavy focus on APIs. A variety of challenges require a proxy which include encryption, password cracking, scripting, and path traversal.
Advanced range with a user and admin functionality. Features 4 levels of binary exploitation challenges that require injecting script into PDF headers to be later processed by the system. Includes advanced evasion techniques and crypto (HMAC replay) attacks, XML Injection.
Forescient is a real, intentionally vulnerable AWS cloud environment that features a front-end website, virtual servers, AWS accounts, and major AWS cloud services. Challenges are mapped to the MITRE ATT&CK framework and reflect key security challenges that plague enterprises’ cloud operations: more>>
This ultra-realistic cyber range is built as a real AWS cloud-native application and perfectly emulates a cloud-based file storage solution. InfiniCrate challenges Cloud Developers, Cloud Engineers, and DevOps Engineers to use, and share with their teammates, every shred of security knowing they have in order to find InfiniCrate’s vulnerabilities. more>>