Check Point Cyberpark Broken Access Control Cyber Range Most computer systems are designed for use with multiple users. Privilege escalation means a user receives privileges they are not entitled…
Check Point Cyberpark Broken Authentication - Cyber Range Broken Authentication involves all kinds of flaws that are caused by errors in implementation of authentication and/or session management.…
Check Point Cyberpark Sensitive Data Exposure 1 Cyber Range Sensitive Data Exposure occurs when an application does not adequately protect sensitive information. The data can vary and anything from…
Check Point Cyberpark Cryptographic Issues Cyber Range Protecting sensitive data with cryptography has become a key part of most applications. Simply failing to encrypt sensitive data is very…
Check Point Cyberpark Serverless The process of application development begins with recognition of a need that a technology or service will fulfil, with security merely…
Check Point Cyberpark Game of Clouds Use CloudGuard IaaS, Dome9 and LOG.IC and assist a game studio that has suffered a breach on its newly set up cloud infrastructure.…
Check Point Cyberpark The Wizard of OS Your task is to save the world from the nuclear threat of a secluded evil dictatorship. Perform reconnaissance, find vulnerabilities to…
Check Point Cyberpark Lord of the Pings We will help you get access to a sensitive laptop that contains the keys to bringing down the nuclear facility. Perform many OffSec…
Check Point Cyberpark Santa's Red Hat Cyber Range We have received intelligence reports that Santa's new supplier is going to deliver horrible gifts for him to deliver. Our intelligence is…
Check Point Cyberpark APPocalyps Now We need collect relevant data from the Nuclear facility in this campaign. We'll help you gain access through a Trojan, but after that, it…
Check Point Cyberpark Sour Lemon Focused on Check Point advanced technologies, including Harmony Endpoint and SmartConsole, which are part of the Check Point Infinity…
Check Point Cyberpark Cloudy for CxO The company has migrated to Office 365, and all of the employees are insured by Hanson & Wood Insurance. Because the Company is already in…
Check Point Cyberpark Anatomy of Attack - Part 1 Cyber Range Join “Javelin”, an elite Penetration Testing team, as it executes an attack on the smart city of Redford. Learn the hacker’s state of mind…
Check Point Cyberpark Anatomy of Attack - Part 2 Cyber Range The second campaign of the “Javelin” Penetration Testing team series. This time the team is testing the security posture of a leading…
Check Point Cyberpark Recording Crucial Error (RCE) Cyber Range Because of recent news about a very severe vulnerability that turns out to exist in a lot of applications, our company was hired to perform…