🚩Disarm Me CTF: Hack, Decrypt, Disable

Event Overview

This red team–style CTF puts your team in the role of attackers breaking into an emulated internal network. You’ll play as contracted gray-hat operatives (SAVE) infiltrating The League β€” a shadowy collective behind ransomware and extortion campaigns β€” to recover intelligence and disrupt their plans. Why it matters: this immersive, hands-on scenario trains teams in offensive techniques and attacker thinking so they can better anticipate and mitigate threats in their own environments. All activity runs in a safe, non-production setting and yields actionable insights. What you’ll practice: πŸ” Attacker tradecraft β€” reconnaissance, exploitation, persistence. 🧠 Adversary tool fluency β€” exposure to real-world tools and methods. 🀝 Critical thinking & communication β€” operate as a focused squad under timed pressure. πŸ—‚οΈ Side quests & extra intelligence β€” optional objectives that surface richer findings for your organization.

What to expect

Thousands of organizations worldwide are under siege from ransomware campaigns. In this emulation, you’ll join a hacktivist group called SAVE, tasked with covertly breaking into The League’s network to disrupt their plans. Open source Tools utilized:
  • Frameworks – Metasploit
  • Post-exploitation – Meterpreter
  • SQL vulnerability detection/exploitation – SQLmap
  • Web Reconnaissance/Exploitation – Burp Suite
  • Directory/File enumeration – Dirbuster, Wfuzz
  • DNS enumeration – Fierce, DNSrecon
  • Password Cracking – John-the-Ripper, Hashcat
  • Network Reconnaissance – NMAP
  • Steganography – Steghide
  • Reverse-Engineering – Ghidra, GDB, Strings

Goals and Objectives

Points are awarded for completing challenges, covertly breaking into The League’s network, and collaborating with your team to obtain the final passphrase. Expect a mix of core objectives and optional targets that add extra scoring and intelligence for your organization. 🚨 Practice realistic incident scenarios without risk to production systems 🀝 Improve team coordination β€” align roles and communication under timed pressure πŸ“Š Surface skill & process gaps to inform future training and investments πŸ“‹ Generate actionable insights that support tabletop exercises, IR playbooks, and stakeholder reporting

Who should attend?

This CTF is designed for technical teams who want hands-on offensive experience and for leaders who need clear takeaways about attacker behavior and organizational readiness. πŸ•΅οΈ Red teamers & penetration testers β€” sharpen exploitation technique and tool usage πŸ›‘οΈ Incident responders & SOC analysts β€” learn attacker steps to improve detection and containment strategies βš™οΈ Security architects & engineers β€” see how design choices may be exploited and identify defensive hardening opportunities πŸ“ˆ CISOs & security managers β€” observe attacker behavior firsthand and gather evidence to inform risk decisions and investment cases πŸ”¬ Researchers & ethical hackers β€” test theory in a high-fidelity, scenario-based environment