logo
  • Home
  • Home
  • Leaderboard
  • Learn
  • Home
  • Leaderboard
  • Learn

Login

Learn

Learn how to defend and attack in the world of cybersecurity with realistic modules designed to build your skills step-by-step.

Learning Progress0%

Modules

Getting Started

Beginner 1 min
Welcome to your cybersecurity journey! Before diving into the exciting world of CyberBattles, it's crucial to build a solid foundation of key cybersecurity concepts. These fundamentals are not just academic, they're the same principles used by professionals in the industry every day.
Each module below is carefully crafted to give you practical knowledge and hands-on experience. Complete them in order to unlock your full potential in this high-stakes digital battlefield.

Ethical Hacking

Intermediate 5 min
Ethical hackers represent the offensive side of cybersecurity hackers who simulate real-world cyberattacks to help organizations identify and fix vulnerabilities before malicious actors can exploit them. Ethical hackers have the same skills and use the same tools and tactics as malicious hackers, but their goal is always to improve network security without harming the network or its users.
Unlike malicious attackers, these professionals operate with explicit permission and focus on improving security rather than causing damage. They use the same sophisticated tools and techniques as cybercriminals, but their mission is protection through controlled testing.
In many ways, ethical hacking is like a rehearsal for real-world cyberattacks. Organizations hire ethical hackers to launch simulated attacks on their computer networks. During these attacks, the ethical hackers demonstrate how actual cybercriminals break into a network and the damage they could do once inside.
Common Targets: • AI systems and machine learning models • Critical databases and data repositories • Network firewalls and perimeter defenses • Cryptographic implementations • Endpoint security solutions • Intrusion detection systems • Web applications and APIs • Server infrastructure
Arsenal of Techniques: • Social engineering and phishing campaigns • Physical security assessments • Network reconnaissance and sniffing • Credential attacks and password spraying • Privilege escalation and lateral movement

References

  • https://www.ibm.com/think/topics/ethical-hacking

Blue Teaming

Intermediate 5 min
Blue teaming is the defensive backbone of cybersecurity, the vigilant guardians who protect organizational assets from both external threats and internal vulnerabilities. They're the digital first responders who detect, analyze, and neutralize security incidents.
Blue teams have comprehensive access to an organization's entire infrastructure. This 'white box' perspective allows them to create detailed risk assessments and implement proactive security measures.
The Black Box Advantage: While red teams often work with limited information (black box testing), blue teams leverage their internal knowledge to anticipate attack vectors and strengthen defenses before threats materialize.
Core Responsibilities: • Continuous security monitoring and threat hunting • Incident response and forensic analysis • Security awareness training and education • Infrastructure hardening and patch management • Risk assessment and compliance reporting • Security tool deployment and management
Blue team professionals must possess deep technical expertise, exceptional analytical skills, and the ability to think like both defenders and attackers. They're often the unsung heroes who prevent breaches that never make headlines.

References

  • https://www.ibm.com/think/topics/blue-team
  • https://en.wikipedia.org/wiki/Black_box

Basics of SSH

Intermediate 15 min
Secure Shell Protocol (SSH) is the cornerstone of secure remote administration. Built on top of the reliable TCP/IP protocol suite, SSH enables encrypted communication channels for managing servers, transferring files, and accessing remote services safely across untrusted networks.
Why SSH is Secure: SSH employs public key cryptography, creating an unbreakable authentication system. Each user generates a mathematically linked key pair, a private key (kept secret) and a public key (shared freely). Only when these keys match can identity be verified and secure communication established.
Mutual Authentication: In SSH connections, both client and server authenticate each other using their respective key pairs, ensuring you're connecting to the legitimate server and the server can verify your identity.
Let's explore the essential SSH commands that form the foundation of secure remote operations:
terminal
ssh username@hostname
The fundamental SSH connection command. Replace 'username' with your account name on the remote system and 'hostname' with the server's IP address or domain name. You'll be prompted for your password unless key-based authentication is configured.
terminal
ssh-keygen
ssh-copy-id username@hostname
Generate your security credentials with ssh-keygen, creating your personal key pair. Then use ssh-copy-id to securely install your public key on the remote server's authorized_keys file. This enables password-free authentication using your private key.
terminal
ssh username@host "ls -la"
Execute commands remotely without maintaining an interactive session. This example runs 'ls -la' on the remote server, displaying detailed file information including permissions, ownership, and modification dates, then returns you to your local terminal.
terminal
scp localfile.txt username@hostname:/remote/path
Securely transfer files using SSH's built-in copy protocol. This command uploads 'localfile.txt' to the specified remote path. Reverse the source and destination to download files from the remote server to your local machine.

References

  • https://www.ssh.com/academy/ssh/command#ssh-command-in-linux
  • https://www.cloudflare.com/learning/access-management/what-is-ssh/

Capture the Flags

Advanced 25 min
CTF or Capture the Flag is a cybersecurity competitive event where participants solve security-related challenges to find hidden strings called flags. Often found in the format
terminal
CTF{yoU_FoUnD_M3}
These challenges simulate real-world vulnerabilities and problems across areas like cryptography, web security, reverse engineering, forensics and binary exploitation.
The goal is to capture as many flags as possible as a team or individual within a time limit. Each flag earns points and players or teams are ranked on a scoreboard.

Cryptography

Cryptography included breaking weak algorithms, recovering keys, understanding math flaws, such as a Caesar Cipher algorithm. In the example below, we see a encoded message which has used a caeser cipher algorithm. All letters are shifted by a certain number of offsets. In this case, we have an offset of 3, so A would become D. To crack the encryption we can shift the offset, print the result and end when a flag is discovered.
terminal
ciphertext = "fdwfk_wkh_iodj"
def decrypt(text, shift):
   result = ""
   for c in text:
     if c.isalpha():
       shift_base = ord(A) if c.isupper() else ord(a)
       result += chr((ord(c) - shift_base - shift) % 26 + shift_base)
     else:
      result += c
   return result
terminal
for s in range(26):
   print(s, decrypt(ciphertext, s))
OUTPUT: catch_the_flag

Binary Exploitation (PWN)

Binary Exploitation includes reverse engineering of binaries, exploiting memory bugs like buffer overflows, formatted strings. An example of this is an input overflow to get a shell. In the below code the function vuln() is called from main. Using gets() the program reads bytes from standard input into buffer without any bounds checking. If the user types more than 32 bytes, those extra bytes are written into adjacent memory releasing the flag.
terminal
void win() {
    printf("CTF{buffer_overflow_success});
}


void vuln() {
    char buf[32];
    gets(buf); // Vulnerable function!
}


int main() {
    vuln();
    return 0;
}

Reverse Engineering

Involves analysing compiled code to recover logic or keys. Examples include disassembling binary to find hidden flags.

Web Exploitation

Occurs via exploiting vulnerable web apps (SQLI, XSS, insecure auth) by potentially injecting payloads into parameters. In the example provided below an SQL attack occurs. We are assuming that the application builds an SQL query by string concatenation. If an attacker was to supply the command below, because 1 is always true, the WHERE clause can evaluate to true, bypassing authentication.
terminal
-- Vulnerable login check
SELECT * FROM users WHERE username = '$user' AND password = '$pass';

-- Attacker Input
' OR '1'='1
 Authentication bypassed!

Forensics

Analysing files, memory dumps, disk images or network traffic to receover hidden files, such as inside a PNG.

OSINT

OSINT (Open-Source Intelligence) is the process of collecting and analyzing information from publicly available sources to generate useful intelligence. These sources can include websites, social media, news articles, government publications, forums, images, and even metadata hidden in files.

Beginner Learning Tool

CyberChef is a simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. CyberChef encourages both technical and non-technical people to explore data formats, encryption and compression. A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. CyberChef encourages both technical and non-technical people to explore data formats, encryption and compression.

References

  • https://gchq.github.io/CyberChef/
  • https://ctf.hacker101.com/
  • https://www.vmray.com/def-con-ctf-finals-an-inside-view/

Importance of Uptime

Beginner 10 min
System uptime is the foundation of digital trust and business continuity. In our interconnected world, even seconds of downtime can result in significant financial losses, damaged reputation, and compromised user experience.
Business Impact: For mission-critical systems, 99.9% uptime means 8.76 hours of downtime per year, while 99.99% allows only 52.56 minutes. Understanding these metrics helps organizations balance reliability investments with business requirements.