Welcome to the ultimate hands-on cybersecurity experience for students and beginners!
This repository hosts a multi-level challenge designed to sharpen your skills in:
- 🧠 Networking
- 🔍 Reconnaissance
- 💣 Exploitation
- 🛠️ Incident Response
Each level increases in complexity and shifts from solo tasks to collaborative, team-based exercises.
Complete them in order for the full experience!
| Level | Title | Mode | Skills |
|---|---|---|---|
| 🧩 1 | Network Foundations | 🧑💻 Solo | 🛠️ IP Addressing, Connectivity Testing |
| 🧪 2 | VM Lab & Nmap | 🧑💻 Solo | 🔍 Virtualization, Network Scanning |
| ⚔️ 3 | Attack & Defense Lifecycle | 👥 Collaborative | 💣 Exploitation, Remediation |
| 🧠 4 | Live Red vs. Blue | 🧑🤝🧑 Team-Based | 🧭 Strategic Thinking, DevSecOps |
🔹 Level 1: Network Foundations
- Task: Build a small office network in Cisco Packet Tracer.
- Skills: Basic networking, IP addressing, connectivity testing.
🔹 Level 2: VM Lab & Nmap
- Task: Set up an attacker/target virtual lab and perform reconnaissance with Nmap.
- Skills: Virtualization, network scanning, service identification.
🔹 Level 3: Attack & Defense Lifecycle
- Task: Document a full attack lifecycle on a simple application, from vulnerability to patch.
- Skills: Vulnerability analysis, exploitation, remediation, technical documentation.
🔹 Level 4: Live Red vs. Blue – The Data Heist
- Task: A competitive game where the Red Team tries to steal a secret file from a live application, and the Blue Team must patch the code in real-time to stop them.
- Skills: Incident response, strategic thinking, collaborative documentation, offensive/defensive tactics.
-
📖 Read the Guidelines
Start with theCONTRIBUTING.mdfile for rules and workflow. -
🗂️ Choose a Level
Navigate to the folder for your chosen level (e.g.,level1-foundations/). -
📝 Claim a Task
Go to the Issues tab and create a new issue using the correct template. -
🌿 Fork, Branch, & Work
Follow the contribution guidelines to complete your task. -
🚀 Submit a Pull Request
Use the correct PR template to submit your work for review.
💡 Whether you're a curious beginner or a rising security star, this challenge is your playground.
Dive in, learn by doing, and contribute to a growing community of ethical hackers!