Skip to main contentSkip to main content
Back to all modules

Advent of Cyber 2025

Advent of Cyber 2025 icon

A warm up room, followed by 24 walkthrough rooms taken from our Advent of Cyber 2025 event.

Revisit our Advent of Cyber 2025 event, with a warm up room plus 24 individual walkthrough rooms covering topics from Linux Fundamentals to AI Security. Get yourself skilled up and help save Wareville in the process.

Advent of Cyber 2025 icon
image

0%

Advent of Cyber Prep Track

Get ready for the Advent of Cyber 2025 with the "Advent of Cyber Prep Track", a series of warm-up tasks aimed to get beginners ready for this year's event.

image

0%

Linux CLI - Shells Bells

Explore the Linux command-line interface and use it to unveil Christmas mysteries.

image

0%

Phishing - Merry Clickmas

Learn how to use the Social-Engineer Toolkit to send phishing emails.

image

0%

Splunk Basics - Did you SIEM?

Learn how to ingest and parse custom log data using Splunk.

image

0%

AI in Security - old sAInt nick

Unleash the power of AI by exploring it's uses within cyber security.

image

0%

IDOR - Santa’s Little IDOR

Learn about IDOR while helping pentest the TrypresentMe website.

image

0%

Malware Analysis - Egg-xecutable

Discover some common tooling for malware analysis within a sandbox environment.

image

0%

Network Discovery - Scan-ta Clause

Discover how to scan network ports and uncover what is hidden behind them.

image

0%

Prompt Injection - Sched-yule conflict

Learn to identify and exploit weaknesses in autonomous AI agents.

image

0%

Passwords - A Cracking Christmas

Learn how to crack password-based encrypted files.

image

0%

SOC Alert Triaging - Tinsel Triage

Investigate and triage alerts through Microsoft Sentinel.

image

0%

XSS - Merry XSSMas

Learn about types of XSS vulnerabilities and how to prevent them.

image

0%

Phishing - Phishmas Greetings

Learn how to spot phishing emails from Malhare's Eggsploit Bunnies sent to TBFC users.

image

0%

YARA Rules - YARA mean one!

Learn how YARA rules can be used to detect anomalies.

image

0%

Containers - DoorDasher's Demise

Continue your Advent of Cyber journey and learn about container security.

image

0%

Web Attack Forensics - Drone Alone

Explore web attack forensics using Splunk.

image

0%

Forensics - Registry Furensics

Learn what the Windows Registry is and how to investigate it.

image

0%

CyberChef - Hoperation Save McSkidy

The story continues, and the elves mount a rescue and will try to breach the Quantum Fortress's defenses and free McSkidy.

image

0%

Obfuscation - The Egg Shell File

McSkidy keeps her focus on a particular alert that caught her interest: an email posing as northpole-hr.

image

0%

ICS/Modbus - Claus for Concern

Learn to identify and exploit weaknesses in ICS systems.

image

0%

Race Conditions - Toy to The World

Learn how to exploit a race condition attack to oversell the limited-edition SleighToy.

image

0%

Malware Analysis - Malhare.exe

Learn about malware analysis and forensics.

image

0%

C2 Detection - Command & Carol

Explore how to analyze a large PCAP and extract valuable information.

image

0%

AWS Security - S3cret Santa

Learn the basics of AWS enumeration.

image

0%

Exploitation with cURL - Hoperation Eggsploit

The evil Easter bunnies operate a web control panel that holds the wormhole open. Using cURL, identify the endpoints, send the required requests, and shut the wormhole once and for all.

Topic Rewind Recap

Lock in what you learned with a recap. Earn points and keep your streak.

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Hierarchical diagram showing how learning pathways contain modules, which contain individual rooms.

We use cookies to ensure you get the best user experience. For more information see our cookie policy.