Loading
Loading Artifacts

IEEE CyberSecurity Competition

IEEE CyberSecurity Competition 2025 - Workstation

DFIR Forensics Incident Response Threat Hunting Malware Analysis

Overview

This workstation contains source code and automated build scripts for IEEE CyberSecurity Competition 2025 challenges. Each lab includes automated scripting for deployment and writeups documenting solution approaches.

Directory Structure

DFIR/
├── Qualification/
│   ├── NetRules Hunter/
│   ├── CryptoMiner Hunter/
│   ├── APT41/
│   └── LAZARUS HEIST/
└── Final/
    ├── GPP Hunter/
    ├── SOC/
    └── SupplyChain Hunter/

Build Process

Each challenge directory contains automated scripts for environment setup, deployment, and validation. Writeups document the challenge design, intended solution path, and alternative approaches.

Technologies Used

Challenges leverage various forensics and incident response tools including memory analysis frameworks, network traffic analysis utilities, log parsing tools, and threat intelligence platforms.

Repository Navigation

  • /Qualification/ - First round challenges
  • /Final/ - Championship round challenges
  • Each challenge folder contains build scr

All Content

0/1000
Loading comments...