www.cadosecurity.com
Open in
urlscan Pro
188.114.96.3
Public Scan
Submitted URL: https://www.cadosecurity.com/capture-the-flag-october-30
Effective URL: https://www.cadosecurity.com/oct30-capture-the-flag-closed
Submission: On November 03 via manual from IL — Scanned from NL
Effective URL: https://www.cadosecurity.com/oct30-capture-the-flag-closed
Submission: On November 03 via manual from IL — Scanned from NL
Form analysis
2 forms found in the DOM/hs-search-results
<form action="/hs-search-results" data-hs-cf-bound="true">
<input type="text" class="hs-search-field__input search-input" name="term" autocomplete="off" aria-label="Search" placeholder="Search">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="LANDING_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
<input type="hidden" name="type" value="KNOWLEDGE_ARTICLE">
<button aria-label="Search" class="search-button">
<svg width="18px" height="18px" viewBox="0 0 18 18" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
<g id="Round-Three-Design" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
<g id="CADO-Additional-Modules-R3" transform="translate(-1299, -58)" fill="#0E4271" fill-rule="nonzero">
<g id="search_FILL0_wght400_GRAD0_opsz24-(6)-Copy" transform="translate(1299, 58)">
<path
d="M16.6,18 L10.3,11.7 C9.8,12.1 9.225,12.4166667 8.575,12.65 C7.925,12.8833333 7.23333333,13 6.5,13 C4.68333333,13 3.14583333,12.3708333 1.8875,11.1125 C0.629166667,9.85416667 0,8.31666667 0,6.5 C0,4.68333333 0.629166667,3.14583333 1.8875,1.8875 C3.14583333,0.629166667 4.68333333,0 6.5,0 C8.31666667,0 9.85416667,0.629166667 11.1125,1.8875 C12.3708333,3.14583333 13,4.68333333 13,6.5 C13,7.23333333 12.8833333,7.925 12.65,8.575 C12.4166667,9.225 12.1,9.8 11.7,10.3 L18,16.6 L16.6,18 Z M6.5,11 C7.75,11 8.8125,10.5625 9.6875,9.6875 C10.5625,8.8125 11,7.75 11,6.5 C11,5.25 10.5625,4.1875 9.6875,3.3125 C8.8125,2.4375 7.75,2 6.5,2 C5.25,2 4.1875,2.4375 3.3125,3.3125 C2.4375,4.1875 2,5.25 2,6.5 C2,7.75 2.4375,8.8125 3.3125,9.6875 C4.1875,10.5625 5.25,11 6.5,11 Z"
id="Shape"></path>
</g>
</g>
</g>
</svg>
</button>
<span class="search-overlay-close search-toggle-button" aria-label="Close">
<i class="fas fa-times" aria-hidden="true"></i>
</span>
</form>
/hs-search-results
<form action="/hs-search-results" data-hs-cf-bound="true">
<input type="text" class="hs-search-field__input search-input" name="term" autocomplete="off" aria-label="Search" placeholder="Search">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="LANDING_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
<input type="hidden" name="type" value="KNOWLEDGE_ARTICLE">
<button aria-label="Search" class="search-button">
<svg width="18px" height="18px" viewBox="0 0 18 18" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
<g id="Round-Three-Design" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">
<g id="CADO-Additional-Modules-R3" transform="translate(-1299, -58)" fill="#0E4271" fill-rule="nonzero">
<g id="search_FILL0_wght400_GRAD0_opsz24-(6)-Copy" transform="translate(1299, 58)">
<path
d="M16.6,18 L10.3,11.7 C9.8,12.1 9.225,12.4166667 8.575,12.65 C7.925,12.8833333 7.23333333,13 6.5,13 C4.68333333,13 3.14583333,12.3708333 1.8875,11.1125 C0.629166667,9.85416667 0,8.31666667 0,6.5 C0,4.68333333 0.629166667,3.14583333 1.8875,1.8875 C3.14583333,0.629166667 4.68333333,0 6.5,0 C8.31666667,0 9.85416667,0.629166667 11.1125,1.8875 C12.3708333,3.14583333 13,4.68333333 13,6.5 C13,7.23333333 12.8833333,7.925 12.65,8.575 C12.4166667,9.225 12.1,9.8 11.7,10.3 L18,16.6 L16.6,18 Z M6.5,11 C7.75,11 8.8125,10.5625 9.6875,9.6875 C10.5625,8.8125 11,7.75 11,6.5 C11,5.25 10.5625,4.1875 9.6875,3.3125 C8.8125,2.4375 7.75,2 6.5,2 C5.25,2 4.1875,2.4375 3.3125,3.3125 C2.4375,4.1875 2,5.25 2,6.5 C2,7.75 2.4375,8.8125 3.3125,9.6875 C4.1875,10.5625 5.25,11 6.5,11 Z"
id="Shape"></path>
</g>
</g>
</g>
</svg>
</button>
<span class="search-overlay-close search-toggle-button" aria-label="Close">
<i class="fas fa-times" aria-hidden="true"></i>
</span>
</form>
Text Content
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allows us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy. If you decline, your information won't be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. AcceptDecline Skip to content Product PLATFORM Explore the core capabilities of the Cado Platform. ENVIRONMENTS Discover the broad support that the Cado platform offers. INTEGRATIONS Learn how the Cado platform integrates into your broader ecosystem. Solutions USE CASES CROSS CLOUD INVESTIGATIONS Respond to incidents identified in AWS, Azure, and GCP in a single pane of glass. CONTAINER & K8S INVESTIGATIONS Perform container investigations in EKS, AKS, GKE, and Kubernetes. ENDPOINT TRIAGE Automate endpoint triage for immediate insights and quick escalation. SAAS INVESTIGATIONS Analyze critical SaaS logs to investigate Business Email Compromise. CLOUD DETECTION & RESPONSE (CDR) Marry threat detection with forensic context to expedite response. EVIDENCE PRESERVATION Capture data immediately and preserve it before it disappears. CADO FOR DFIR SOC MSSPS PARTNERS GOVERNMENT Resources ALL RESOURCES Explore Cado Security's entire content library. BLOG Timely commentary from the Cado Security team. PLAYBOOKS Best practices for investigating and responding to threats. CHEAT SHEETS Quick tips for investigating and responding to incidents. NEWS The latest Cado company announcements, press, and more. COMMUNITY Access to our free edition of the Cado platform. DOCUMENTATION Technical documentation on how to best leverage the Cado platform. WIKI Everything you need to know about cloud security and cloud forensics. Company ABOUT Learn more about the Cado Security mission, vision, and team. CAREERS Check out current career opportunities at Cado Security. CADO SECURITY LABS The research and development division at Cado Security Get a Demo * Product * Platform * Environments * Integrations * Solutions * All Solutions * Use Cases * Cross Cloud Investigations * Container & K8s Investigations * Endpoint Triage * SaaS Investigations * Cloud Detection & Response (CDR) * Evidence Preservation * Cado For * DFIR * SOC * MSSPs * Partners * Government * Resources * All Resources * Blog * News * Community * Documentation * Wiki * Company * About * Careers * Cado Security Labs Get a Demo THANK YOU! Thank you for your interest in the October 30, 2024 CTF Challenge. Registration for that event is now closed. Registration for the next CTF Challenge on December 5, 2024 is now open. You can register using the button below. Register now RECOMMENDED CONTENT Playbook THE ULTIMATE GUIDE TO AUTOMATING INCIDENT RESPOSE Best practices for evidence collection, procession, and analysis, and how to put to use in your environment. Read Blog WHY IS CIRA ALL THE HYPE FOR CLOUD INCIDENT RESPONSE? CIRA is the solution to allow security teams to keep up with the rapidly evolving cloud threat landscape and ensure timely risk mitigation. Read Blog A NEW PERSPECTIVE ON CLOUD FORENSICS This blog post explores a modern perspective on understanding resource-level cloud forensics. Read * Product * Platform * Environments * Integrations * Solutions by Use Case * Cross Cloud Investigations * Container & K8s Investigations * Endpoint Triage * SaaS Investigations * Cloud Detection & Response (CDR) * Evidence Preservation * Solutions by Industry * DFIR * SOC * MSSPs * Partners * Government * Resources * All Resources * Blog * Playbooks * Cheat Sheets * News * Community * Documentation * Wiki * Company * About * Careers * Cado Security Labs * * * * * * Copyright© 2024, Cado Security, All Rights Reserved Privacy Policy