www.cadosecurity.com Open in urlscan Pro
188.114.96.3  Public Scan

Submitted URL: https://www.cadosecurity.com/capture-the-flag-october-30
Effective URL: https://www.cadosecurity.com/oct30-capture-the-flag-closed
Submission: On November 03 via manual from IL — Scanned from NL

Form analysis 2 forms found in the DOM

/hs-search-results

<form action="/hs-search-results" data-hs-cf-bound="true">
  <input type="text" class="hs-search-field__input search-input" name="term" autocomplete="off" aria-label="Search" placeholder="Search">
  <input type="hidden" name="type" value="SITE_PAGE">
  <input type="hidden" name="type" value="LANDING_PAGE">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="type" value="LISTING_PAGE">
  <input type="hidden" name="type" value="KNOWLEDGE_ARTICLE">
  <button aria-label="Search" class="search-button">
    <svg width="18px" height="18px" viewBox="0 0 18 18" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
      <g id="Round-Three-Design" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
        <g id="CADO-Additional-Modules-R3" transform="translate(-1299, -58)" fill="#0E4271" fill-rule="nonzero">
          <g id="search_FILL0_wght400_GRAD0_opsz24-(6)-Copy" transform="translate(1299, 58)">
            <path
              d="M16.6,18 L10.3,11.7 C9.8,12.1 9.225,12.4166667 8.575,12.65 C7.925,12.8833333 7.23333333,13 6.5,13 C4.68333333,13 3.14583333,12.3708333 1.8875,11.1125 C0.629166667,9.85416667 0,8.31666667 0,6.5 C0,4.68333333 0.629166667,3.14583333 1.8875,1.8875 C3.14583333,0.629166667 4.68333333,0 6.5,0 C8.31666667,0 9.85416667,0.629166667 11.1125,1.8875 C12.3708333,3.14583333 13,4.68333333 13,6.5 C13,7.23333333 12.8833333,7.925 12.65,8.575 C12.4166667,9.225 12.1,9.8 11.7,10.3 L18,16.6 L16.6,18 Z M6.5,11 C7.75,11 8.8125,10.5625 9.6875,9.6875 C10.5625,8.8125 11,7.75 11,6.5 C11,5.25 10.5625,4.1875 9.6875,3.3125 C8.8125,2.4375 7.75,2 6.5,2 C5.25,2 4.1875,2.4375 3.3125,3.3125 C2.4375,4.1875 2,5.25 2,6.5 C2,7.75 2.4375,8.8125 3.3125,9.6875 C4.1875,10.5625 5.25,11 6.5,11 Z"
              id="Shape"></path>
          </g>
        </g>
      </g>
    </svg>
  </button>
  <span class="search-overlay-close search-toggle-button" aria-label="Close">
    <i class="fas fa-times" aria-hidden="true"></i>
  </span>
</form>

/hs-search-results

<form action="/hs-search-results" data-hs-cf-bound="true">
  <input type="text" class="hs-search-field__input search-input" name="term" autocomplete="off" aria-label="Search" placeholder="Search">
  <input type="hidden" name="type" value="SITE_PAGE">
  <input type="hidden" name="type" value="LANDING_PAGE">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="type" value="LISTING_PAGE">
  <input type="hidden" name="type" value="KNOWLEDGE_ARTICLE">
  <button aria-label="Search" class="search-button">
    <svg width="18px" height="18px" viewBox="0 0 18 18" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
      <g id="Round-Three-Design" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
        <g id="CADO-Additional-Modules-R3" transform="translate(-1299, -58)" fill="#0E4271" fill-rule="nonzero">
          <g id="search_FILL0_wght400_GRAD0_opsz24-(6)-Copy" transform="translate(1299, 58)">
            <path
              d="M16.6,18 L10.3,11.7 C9.8,12.1 9.225,12.4166667 8.575,12.65 C7.925,12.8833333 7.23333333,13 6.5,13 C4.68333333,13 3.14583333,12.3708333 1.8875,11.1125 C0.629166667,9.85416667 0,8.31666667 0,6.5 C0,4.68333333 0.629166667,3.14583333 1.8875,1.8875 C3.14583333,0.629166667 4.68333333,0 6.5,0 C8.31666667,0 9.85416667,0.629166667 11.1125,1.8875 C12.3708333,3.14583333 13,4.68333333 13,6.5 C13,7.23333333 12.8833333,7.925 12.65,8.575 C12.4166667,9.225 12.1,9.8 11.7,10.3 L18,16.6 L16.6,18 Z M6.5,11 C7.75,11 8.8125,10.5625 9.6875,9.6875 C10.5625,8.8125 11,7.75 11,6.5 C11,5.25 10.5625,4.1875 9.6875,3.3125 C8.8125,2.4375 7.75,2 6.5,2 C5.25,2 4.1875,2.4375 3.3125,3.3125 C2.4375,4.1875 2,5.25 2,6.5 C2,7.75 2.4375,8.8125 3.3125,9.6875 C4.1875,10.5625 5.25,11 6.5,11 Z"
              id="Shape"></path>
          </g>
        </g>
      </g>
    </svg>
  </button>
  <span class="search-overlay-close search-toggle-button" aria-label="Close">
    <i class="fas fa-times" aria-hidden="true"></i>
  </span>
</form>

Text Content

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allows us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy.


If you decline, your information won't be tracked when you visit this website. A
single cookie will be used in your browser to remember your preference not to be
tracked.

AcceptDecline

Skip to content
Product


PLATFORM

Explore the core capabilities of the Cado Platform.

ENVIRONMENTS

Discover the broad support that the Cado platform offers.

INTEGRATIONS

Learn how the Cado platform integrates into your broader ecosystem.

Solutions


USE CASES

CROSS CLOUD INVESTIGATIONS

Respond to incidents identified in AWS, Azure, and GCP in a single pane of
glass.

CONTAINER & K8S INVESTIGATIONS

Perform container investigations in EKS, AKS, GKE, and Kubernetes.

ENDPOINT TRIAGE

Automate endpoint triage for immediate insights and quick escalation.

SAAS INVESTIGATIONS

Analyze critical SaaS logs to investigate Business Email Compromise.

CLOUD DETECTION & RESPONSE (CDR)

Marry threat detection with forensic context to expedite response.

EVIDENCE PRESERVATION

Capture data immediately and preserve it before it disappears.

CADO FOR

DFIR

SOC

MSSPS

PARTNERS

GOVERNMENT

Resources


ALL RESOURCES

Explore Cado Security's entire content library.

BLOG

Timely commentary from the Cado Security team.

PLAYBOOKS

Best practices for investigating and responding to threats.

CHEAT SHEETS

Quick tips for investigating and responding to incidents.

NEWS

The latest Cado company announcements, press, and more.

COMMUNITY

Access to our free edition of the Cado platform.

DOCUMENTATION

Technical documentation on how to best leverage the Cado platform.

WIKI

Everything you need to know about cloud security and cloud forensics.

Company


ABOUT

Learn more about the Cado Security mission, vision, and team.

CAREERS

Check out current career opportunities at Cado Security.

CADO SECURITY LABS

The research and development division at Cado Security


Get a Demo
 * Product
   * Platform
   * Environments
   * Integrations
 * Solutions
   * All Solutions
   * Use Cases
     * Cross Cloud Investigations
     * Container & K8s Investigations
     * Endpoint Triage
     * SaaS Investigations
     * Cloud Detection & Response (CDR)
     * Evidence Preservation
   * Cado For
     * DFIR
     * SOC
     * MSSPs
     * Partners
     * Government
 * Resources
   * All Resources
   * Blog
   * News
   * Community
   * Documentation
   * Wiki
 * Company
   * About
   * Careers
   * Cado Security Labs

Get a Demo



THANK YOU!

Thank you for your interest in the October 30, 2024 CTF Challenge. Registration
for that event is now closed. Registration for the next CTF Challenge on
December 5, 2024 is now open. You can register using the button below.

Register now


RECOMMENDED CONTENT

Playbook

THE ULTIMATE GUIDE TO AUTOMATING INCIDENT RESPOSE

Best practices for evidence collection, procession, and analysis, and how to put
to use in your environment.

Read
Blog

WHY IS CIRA ALL THE HYPE FOR CLOUD INCIDENT RESPONSE?

CIRA is the solution to allow security teams to keep up with the rapidly
evolving cloud threat landscape and ensure timely risk mitigation.

Read
Blog

A NEW PERSPECTIVE ON CLOUD FORENSICS

This blog post explores a modern perspective on understanding resource-level
cloud forensics.

Read
 * Product
   * Platform
   * Environments
   * Integrations
 * Solutions by Use Case
   * Cross Cloud Investigations
   * Container & K8s Investigations
   * Endpoint Triage
   * SaaS Investigations
   * Cloud Detection & Response (CDR)
   * Evidence Preservation
 * Solutions by Industry
   * DFIR
   * SOC
   * MSSPs
   * Partners
   * Government
 * Resources
   * All Resources
   * Blog
   * Playbooks
   * Cheat Sheets
   * News
   * Community
   * Documentation
   * Wiki
 * Company
   * About
   * Careers
   * Cado Security Labs

 * 
 * 
 * 
 * 
 * 
 * 

Copyright© 2024, Cado Security, All Rights Reserved Privacy Policy