{"id":2095,"date":"2022-08-17T16:47:34","date_gmt":"2022-08-17T22:47:34","guid":{"rendered":"https:\/\/cybersecurity.bellevue.edu\/?p=2095"},"modified":"2022-08-17T16:47:34","modified_gmt":"2022-08-17T22:47:34","slug":"nsa-codebreaker-challenge-is-live","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2022\/08\/17\/nsa-codebreaker-challenge-is-live\/","title":{"rendered":"NSA Codebreaker Challenge is Live!"},"content":{"rendered":"\n<p>The NSA Codebreaker Challenge is an opportunity for students to develop and test their low level analysis and reverse engineering skills on a realistic scenario. This year scenario is to help a US company which has been crippled by a ransomeware attack. Your mission is to investigate the attack and discover the tools and techniques used, unravel and expose a Ransomeware-as-a-Service ring, and to recover the victim&#8217;s files. You will utilize skills in the following areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Log Analysis<\/li><li>Computer Forensics<\/li><li>Packet Analysis<\/li><li>Web Analysis<\/li><li>Reverse Engineering<\/li><li>Web Hacking<\/li><li>Cryptography<\/li><li>Cryptoanalysis<\/li><li>Software Development<\/li><\/ul>\n\n\n\n<p>Each year Bellevue University has several students participate in the NSA Codebreaker challenge, is this year your year to participate? More information and register here: <a href=\"https:\/\/nsa-codebreaker.org\/home \">https:\/\/nsa-codebreaker.org\/home <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSA Codebreaker Challenge is an opportunity for students to develop and test their low level analysis and reverse engineering skills on a realistic scenario. This year scenario is to help a US company which has been crippled by a ransomeware attack. Your mission is to investigate the attack and discover the tools and techniques [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[39],"tags":[],"class_list":["post-2095","post","type-post","status-publish","format-standard","hentry","category-ctf"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=2095"}],"version-history":[{"count":6,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2095\/revisions"}],"predecessor-version":[{"id":2101,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2095\/revisions\/2101"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=2095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=2095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=2095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}