Online cyberrange for beginners
Results

Bootcamp
The cyberrange is a virtual infrastructure with realistic replicas of systems and software from various industries, where cybersecurity specialists can train 24/7.
The entire infrastructure is designed around the lore of a virtual state. The state exists within an isolated network, inaccessible from the outside, and comprises various sectors for which industry-specific services with vulnerabilities are re-created. You can explore them by completing tasks of varying difficulty levels.
Right now, you're looking at the page of the online cyberrange for beginners, which is a less challenging training ground compared to the main Standoff cyberrange for professionals. The unique feature of this part of the cyberrange infrastructure is that task cards provide hints. Even though the name suggests that it's for beginners, to tackle the tasks, you'll still need to have a basic understanding of vulnerability discovery and exploitation as well as a good grasp of network technologies.
Connecting to the cyberrange
To connect to the cyberrange and start training, go to My reports → Access and resources and download an OpenVPN config file.
Choosing tasks
Available tasks are listed under Critical events:
• If you want to sharpen your web tech skills, opt for tasks with the [web] prefix.
• If you're more interested in infrastructure, try solving tasks with the [infra] prefix.
• If you want to sharpen your web tech skills, opt for tasks with the [web] prefix.
• If you're more interested in infrastructure, try solving tasks with the [infra] prefix.
Once you're ready, dive into the mission: scan the network, find available services, explore them, and try to obtain access.
Gaining access to services
There are different ways to access services. For example, you can do one of the following things:
• Directly exploit a vulnerability in a service on the external perimeter to access the company's internal network.
• Obtain access to the VPN config file pertaining to the internal network.
• Find employees' email addresses and send them phishing emails with a malicious payload. Once the victims trigger the payload execution, they'll unwittingly grant you access to their workstations.
• Directly exploit a vulnerability in a service on the external perimeter to access the company's internal network.
• Obtain access to the VPN config file pertaining to the internal network.
• Find employees' email addresses and send them phishing emails with a malicious payload. Once the victims trigger the payload execution, they'll unwittingly grant you access to their workstations.
Getting support
If you encounter technical difficulties or have any questions about the cyberrange, write to our Telegram bot. You can also reach out for help in the following ways:
• Ask a question in our community chat.
• Message our community manager Karina. If you'd like, Karina can send you additional materials for trainees.
• Ask a question in our community chat.
• Message our community manager Karina. If you'd like, Karina can send you additional materials for trainees.
Useful information
You can check out our Help Center for answers to frequently asked questions.
Scope
Outer perimeter: 10.124.1.224/27
This cyberrange segment is unavailable every Monday from 03:00 to 09:00 UTC+3.
Statistics
31 of 31Critical events
1611Active hackers
Results
Rank
User
Triggered events
Event points
Total points