Welcome to Hackers Challenge 2021.
A timer will be running from the start of the challenge backward (ends at 19:00 CET time)
You have to read and confirm the Rules & Regulations (marking V).
Only after you confirm, you can start the challenge.
Cyber 2.0, the only company that dared to put its system through three Hackers Challenges, is now doing
it the fourth time.
Since 2018 we have tested our system against hackers all over the world
The Fourth one, will also be via the internet.
Promoted by SYNTYCHE and Integrity Consulting & Risk Management
This challenge became possible once the company started to provide its services in the cloud and not
just internally, specializing mainly in providing service to employees from home and protection for
Recently, due to COVID 19, many employees started working from home and there was a large increase in
the attacks on organizations working from home. Organizations have begun to install a "secure line" for
This secure line ensures that only an approved employee is connected to the organization. However, if
the approved employee's computer at home is infected, the secure line will not be helpful.
Cyber 2.0 software in the employee's home, prevents the possibility of an infected employee's home
computer to connect to the organization and infect it.
Our scenario: Hackers are trying to infiltrate the organization, your
web server is compromised, and all its defense has been striped. Not only that,
but they have managed to get their hands on the Admin Password of your entire network! Their goal is now
to find highly classified information, and take it. This is the nightmare of every IT / Network security
Cyber2.0 is preparing a network of computer-simulated business organization. Its only defense is
The challenge includes five computers: three with Windows 10; one Windows Server 2019 with an IIS web
server, and one Windows Server 2019 acting as a file server. All Internal computers are configured for
No other special configuration and no antivirus or other defense programs are installed.
The only defense mechanism is Cyber 2.0 installed in their System.
The hackers will receive access to an unprotected IIS server (using port 80 or 443), with a simple
website. On the website, they will find the network schematics and the admin user name and passwords of
all the computers (including the webserver)
On the main “Company” Server there is a file named: “Company Strategic Plans for 2021.”
This document has an invisible water seal, and is unique and cannot be counterfeited.
It is located on:
\\Cyber-Prime\files\plans\Company Strategic Plans for 2021.docx.
The file will be uploaded to the site about 15 minutes before the challenge opens.
The Mission: All you need to do now is hack the Cyber 2.0 Defense
system, and obtain this file.
The Reward: The first hacker that breaks into the system and obtains
the file, will win $100,000.
A participant who claims that he has obtained the target file will send an email to the Judging
Committee (email@example.com) and explain the method he
used to obtain it,
and which computer he/she hacked. The first hacker to obtain the target file will be declared the winner
and will receive the reward.
The Judging Committee consists of:
The challenge is open to all, and there is a need for early registration.
Every participant must agree to the Rules & Guidelines for participating in this Hackers Challenge
event and sign it.
Participation is at no cost.
The Challenge will take place on April 21th, 2021, you can start on the home page of our website. (www.cyber20.com)
Participants must 18 years of old
Cyber2.0 may end this Hackers Challenge, or change the rules and guidelines at any time.
Selecting and announcing the winner is the responsibility of the Judging Committee ONLY.
Appealing the decision of the Judging Committee is not allowed!
The organizers of this event are NOT RESPONSIBLE for any physical injury or any damage to equipment,
or any other damages that may occur to any of the participants in this event.
The participants approve that they will have no quarrel or claim for Cyber 2.0 regarding the
competition what so ever
The names of the participants will not be shared with 3rd parties according to GDPR. Information will
be used for educational and marketing purposes
I hereby agree to approve that I have read and understood all the Rules & Guidelines
for participating in this event and fully accept the content of this document.