Honeynet Collapse
Dive into the story of DeceptiTech, a company that fell victim to a ransomware attack. They now desperately need your forensic skills to unwrap the incident and stop the threat from striking again.
Revisit the Honeynet Collapse CTF from summer 2025 through six hands-on challenges covering memory forensics, log analysis, and on-host triage across Windows, Linux, and MacOS. Prove yourself an expert in Advanced Endpoint Investigations by uncovering the breach and combining all artifacts into a single attack timeline.
0%
Initial Access Pot
Investigate the first, Linux part of the Honeynet Collapse!
0%
Elevating Movement
Investigate the second, Windows part of the Honeynet Collapse!
0%
Lost in RAMslation
Investigate the third, memory forensics part of the HoneyNet Collapse!
0%
CRM Snatch
Investigate the fourth, Disk part of the Honeynet Collapse!
0%
Shock and Silence
Investigate the fifth, File System part of the Honeynet Collapse!
0%
The Last Trial
Investigate the sixth, macOS part of the Honeynet Collapse!
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

