Training Modes
Operations Mode
Guided CTF-style training rooms with clear objectives and flags.
Operations Mode
Operations Mode provides structured, guided training through CTF-style rooms. Each room presents a realistic incident scenario with specific objectives to complete.
How It Works
1. Browse Rooms
Visit the Operations page to see available rooms:
- Filters - By difficulty, tool, category, or MITRE technique
- Search - Find specific scenarios
- Tabs - All, In Progress, Completed
2. Select a Room
Each room card shows:
- Title - Scenario name
- Difficulty - Easy, Medium, Hard
- Tool - Primary tool used (SIEM, XDR, Firewall)
- Points - XP awarded on completion
- Estimated Time - How long it typically takes
3. Complete Tasks
Rooms contain multiple tasks:
- Read the scenario briefing
- Complete each task in order (or any order)
- Answer questions or find flags
- Submit your answers
- Review your performance
4. Capture Flags
Flags are hidden answers you discover during investigation:
FLAG{brute_force_detected_192.168.1.100}Flags are case-insensitive. Spaces are ignored.
Room Difficulty
| Difficulty | Description | Points | Time |
|---|---|---|---|
| Easy | Single tool, clear path, simple patterns | 100 | 10-15 min |
| Medium | Multiple tools, some correlation needed | 250 | 20-30 min |
| Hard | Complex scenarios, advanced techniques | 500 | 45-60 min |
Features
Progressive Hints
Stuck on a task? Use hints:
- First hint - Gentle nudge in right direction
- Second hint - More specific guidance
- Third hint - Near-complete solution
Using hints reduces points earned. Try without hints first!
Rich Task Content
Tasks can include:
- Text instructions - What you need to do
- Alert embeds - Pre-loaded alerts to investigate
- Images - Screenshots and diagrams
- Code blocks - Queries or commands to run
- Questions - Multiple choice or free text
Embedded SOC Components
Some tasks embed actual tool interfaces:
- View a real alert card
- Query a log viewer
- Analyze a process tree
Scoring
Points are awarded based on:
| Factor | Impact |
|---|---|
| Difficulty | Higher = more points |
| Hints used | Each hint reduces points |
| Accuracy | Wrong answers reduce score |
| Completion | Partial credit for some tasks |
Categories
Rooms are organized by attack category:
- Initial Access - Phishing, exploit, drive-by
- Execution - PowerShell, macros, scripts
- Persistence - Scheduled tasks, registry, services
- Privilege Escalation - Local admin, token manipulation
- Defense Evasion - Obfuscation, clearing logs
- Credential Access - Credential dumping, brute force
- Lateral Movement - RDP, PsExec, WMI
- Exfiltration - Data theft, C2 channels
Tips for Success
- Read the briefing carefully - Context matters
- Check all tools - Incidents span multiple sources
- Look for timestamps - Build the timeline
- Correlate by IP/user - Connect the dots
- Use hints wisely - Try without first, but don't waste time