IEEE CyberSecurity Competition
IEEE CyberSecurity Competition 2025 - Workstation
Overview
This workstation contains source code and automated build scripts for IEEE CyberSecurity Competition 2025 challenges. Each lab includes automated scripting for deployment and writeups documenting solution approaches.
Directory Structure
DFIR/
├── Qualification/
│ ├── NetRules Hunter/
│ ├── CryptoMiner Hunter/
│ ├── APT41/
│ └── LAZARUS HEIST/
└── Final/
├── GPP Hunter/
├── SOC/
└── SupplyChain Hunter/
Build Process
Each challenge directory contains automated scripts for environment setup, deployment, and validation. Writeups document the challenge design, intended solution path, and alternative approaches.
Technologies Used
Challenges leverage various forensics and incident response tools including memory analysis frameworks, network traffic analysis utilities, log parsing tools, and threat intelligence platforms.
Repository Navigation
/Qualification/- First round challenges/Final/- Championship round challenges- Each challenge folder contains build scr