The Case Vault
In each case, a company has been compromised by vicious hackers.
We'll give you all the tools required to track down and defeat the adversaries.
A Rap Beef (START HERE)
 - Recording mic.png)
About this module:
Great for first time KC7 Players! You don't need any cybersecurity experience to do this module! 🥳 First time? This is the perfect place to start!
Two hip-hop artists are in the midst of a musical feud. Following long-stewing tensions between the artists, they have begun taking jabs at each other through their music.
As a Security Analyst for OWL Records, your job is to keep the company's information safe so your artists don't get exposed during this ongoing feud.
Objectives:
- How to identify elements of a phishing campaign
- How to interpret Security Logs to identify evidence of malicious activity
- How to investigate a basic cybersecurity intrusion
A Scandal in Valdoria 🌟

About this module:
Valdoria, a city rich with untapped natural resources, faces a pivotal election. The stakes are sky-high: will Valdoria's next mayor focus on rampant economic growth 💰 or answer calls for environmental conservation? 🌱
Amidst this high-stakes political showdown, a scandal erupts. 😱 A renowned newspaper, The Valdorian Times, 🗞️ publishes an unapproved news article accusing the leading political candidate of corruption!
In this module, you'll help The Valdorian Times investigate this attack and bring the truth to the people of the town. Every decision, every headline, every whispered rumor could tip the scales.
Objectives:
- Master basic KQL syntax, including
where
,take
, anddistinct
commands - Effectively filter data to focus on relevant information
- Apply time-based filters to investigate events surrounding suspicious indicators
- Correlate events to construct comprehensive attack timelines
- Interpret PowerShell scripts and malicious commands run by attackers
DAILY7 🌎

About this module:
Daily7 is a fun challenge that gives you a new cybersecurity question every day! Try your hand at OSINT, decoding, and lots more! All you need access to is the scoreboard. Use codeword DAILY7 to get started!
Objectives:
Check back on this scoreboard for standalone KC7 DAILY7 challenges. Each day we'll add a new question to the scoreboard for you to answer. Keep your streak & stay on top of the leaderboard!
Jojo's Hospital

About this module:
Jojo's Hospital, a cornerstone of Lexington's healthcare system, faces a critical crisis. The stakes are immense: will the hospital recover its vital services and secure patient data 🏥 or succumb to the paralyzing ransomware attack? 🛡️
In the midst of this high-pressure scenario, a ransomware attack unfolds. 😱 The notorious hacking group, LockByte, has encrypted critical hospital files, demanding a hefty ransom for their release!
In this module, you'll assist Jojo's Hospital in investigating the attack and restoring its operations. Every decision, every piece of evidence, and every strategic move could determine the hospital's fate.
Objectives:
- How to interpret Security Logs to identify evidence of malicious activity
- How to use Azure Data Explorer (ADX) and Kusto Query Language (KQL) to query logs
- How to formulate an analytical question and answer it using data
KQL 101

About this module:
In cybersecurity, every log tells a story. Failed logins, unusual network activity, and hidden threats are all buried in massive datasets. Kusto Query Language (KQL) is a powerful tool that helps you efficiently search, filter, and analyze logs to uncover security incidents before they escalate.
In this module, you’ll learn how to use KQL to query logs, identify patterns, and think like an investigator to stay ahead of cyber threats. Whether you’re a security analyst, threat hunter, or just getting started, KQL 101 will equip you with the skills to turn raw data into actionable intelligence.
Objectives:
- ✅ Understand the data contained in tables and how to navigate columns and rows in KQL.
- ✅ Learn how to filter and refine data using commands like
where
,contains
, andhas
. - ✅ Use logical operators like
and
,or
, andnot
to build precise queries. - ✅ Write efficient KQL queries to search, sort, and extract relevant security data.
Solvi Systems

About this module:
Solvi Systems, a software company, is a key player is South Africa's energy industry ⚡.
With its cutting-edge Docks software, Solvi Systems has become indispensable to major power and utility companies, shaping the distribution of energy in not just South Africa, but across neighboring nations like Mozambique, Eswatini, Zimbabwe, and Namibia. 🌍
However, the interconnectedness of this power grid also brings 😱 vulnerability.
In this module, you'll help investigate an intrusion against Solvi Systems, and find out how attackers may have leveraged their access to discover vulnerabilities in the DOCKS software.
Objectives:
- Investigate a supply chain attack involving Industrial Control Systems (ICS)
- Understand how an attack on the ICS software can have downstream impact
- Combine multiple data sources (e.g., network logs, DNS, authentication events) to establish a detailed timeline of malicious activities—from reconnaissance to data exfiltration.
- Continue to improve your KQL skills
Titan Shield (with Microsoft Defender XDR)

About this module:
Welcome to TitanShield! TitanShield is a world-class defense company best known for manufacturing
Recently, TitanShield has noticed some unusual activity on their network🧐. But not just any network. Someone is messing with files in our most top-secret project: Project Omega! 🕵️♂️🖥️
And… there might be more at play here than meets the eye 👀
In this module, you'll get practice using Microsoft Defender XDR Threat Intelligence to learn more about the intrusion and who was responsible for it!
This module is sponsored by Microsoft.
Objectives:
- Learn to use Microsoft Defender XDR Threat Intelligence to enhance an investigation
Valdoria Votes
About this module:
The Valdoria Board of Elections is gearing up for the most critical election in recent memory. To ensure a smooth voting experience, the board has hired additional poll workers in the past month, preparing them to support operations and assist voters. Officials have made it clear that the voting machines are highly secure, working tirelessly to reassure the public about the integrity of the election process.
However, malicious actors are actively working to sow doubt, hoping to make citizens question the validity of their vote. As Election Day approaches, Valdoria's citizens anxiously watch, wondering if democracy will withstand these challenges.
Objectives:
- deal with yet another election drama in Valdoria 🙄
AzureCrest - The full version

About this module:
Azure Crest Hospital 🏥 is a cornerstone of healthcare excellence, standing tall as a regional medical beacon with a team of over 200 dedicated heroes. Azure Crest is more than a hospital—it's a life-saving universe in the heart of the community. 🩺👩💼🔧
The leadership at Azure Crest Hospital is charting a course towards cost-efficiency, contemplating the tough decision to streamline its workforce. 😔 Alongside this, they're overhauling their critical IT backbone, upgrading servers and databases. 🔄💾
In this module you will dive into the digital drama at Azure Crest Hospital, where you'll unravel the twists of a perilous ransomware attack 🤑, spotlighting the dangers of skimping on costs at the expense of potentially risky tech upgrades 💻.
Objectives:
- How to interpret Security Logs to identify evidence of malicious activity
- How to use Azure Data Explorer (ADX) and Kusto Query Language (KQL) to query logs
- How to interpret PowerShell scripts and malicious commands run by attackers
- How to formulate an analytical question and answer it using data
Castle & Sand

About this module:
In a world of sun, sand, and surf, Castle&Sand reigns supreme as the beacon of beachwear and accessories. But beneath the shimmering facade of this retail paradise lies a digital battleground. This modules delves into the heart of a thriving company known for setting trends and defining summer lifestyles, now facing an unprecedented threat.
Enter the SharkzBoys, a shadowy group of cyber marauders, who unleash a devastating ransomware attack on Castle&Sand's sprawling empire. This gripping narrative isn't just about cutting-edge bikinis and sun hats; it's a high-stakes drama of cyber warfare where every click could spell disaster.
Witness a tense race against time as Castle&Sand battles to reclaim control from the clutches of unseen adversaries. It's a tale of resilience, innovation, and survival, set against the relentless waves of the digital age.
Objectives:
- Use the Azure Data Explorer
- Use multiple data sets to answer targeted questions
- Investigate cyber activity in logs including: email, web traffic, and server logs
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats)
- Use third-party data sets to discover things about your attackers
- Make recommendations on what actions a company can take to protect themselves
Critical Compromise In Chicago - ICS

About this module:
In this KC7 cybersecurity game, you’ll dive into a major power outage in Chicago, caused by a sophisticated attack targeting the city's SCADA systems. As you track down malicious activity, you’ll uncover phishing attacks that compromised employees, leading to destructive malware being deployed . You’ll follow evidence of lateral movement, credential theft, and system sabotage, all while uncovering how the attacker—modeled after a real-world threat actor—gained control and shut down the power grid .
Are you ready for the challenge?
Objectives:
Threat Hunting and Malware Analysis: You’ll learn how to track malicious files, analyze command-line processes, and uncover how malware is deployed across a network.
Phishing Investigation and Credential Compromise: You’ll gain skills in identifying phishing campaigns, tracking compromised accounts, and understanding how attackers leverage stolen credentials for lateral movement.
Incident Response and Root Cause Analysis: You’ll develop the ability to trace an attack from initial compromise to final impact, analyzing logs, network traffic, and system behavior to determine how critical infrastructure was compromised.
Envolve Labs: With a twist!

About this module:
Learn clustering and attribution by analyzing multiple intrusions against a fictitious research company called EnvolveLabs. This time the threat activity is tricky tricky! This is a good example of ways attribution can be challenging.
Objectives:
- How to apply foundational security analysis skills to analyze security log data
- How to “pivot” between datasets using indicators or patterns of interest
- How to identify tactics, techniques, and procedures (TTPs) based on observed threat activity
- How to cluster patterns of threat activity based on overlaps in adversary tradecraft and TTPs
French Socksess Story

About this module:
Start your KC7 adventure here!
In this fun module, you'll investigate a data breach and extortion scheme on a popular French company called 'Jus de Chaussette'.
Objectives:
- Get a first taste of ADX and KQL.
- Learn how to think through the investigation.
- Have fun!
Frognado in Valdoria

About this module:
The Valdorian Times has published another groundbreaking article ahead of the election. This time, it's about the incumbent mayoral candidate. According to the Times, the Mayor took bribes from FramtidX, a development company, to allow them to build a mall on protected land, a special marsh home to endangered frogs. 🐸🌿
Is this another fake story published by the Times, or is there any truth to it? As a cybersecurity analyst for FramtidX, you must dig deep, uncover the cyber side of the scandal, and discover the truth. 🕵️♂️💻🔍 Every piece of evidence you find will help reveal the reality behind the headlines. Can you solve the mystery and protect the future of Valdoria? ⚖️🌟
This is a continuation of the Scandal In Valdoria game. But, don't worry, you can still play this without having done that first.
This module was first published in collaboration with Cybrary at Blackhat 2024
Objectives:
- Understand how the motives of hackvitists impact their chosen actions on objectives
- Interpret Security Logs to identify evidence of malicious activity
- Formulate analytical questions and answer them using data
HopsNStuff

About this module:
HopsNStuff is a brewery renowned for crafting the most delectable ginger beer around. But what truly sets us apart is our secret formula, passed down from generation to generation.
Learn how to work through multiple full intrusion sets starting with an alert.
Objectives:
- Use the Azure Data Explorer
- Use multiple data sets to answer targeted questions
- Investigate cyber activity in logs including: email, web traffic, and server logs
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats)
- Use third party data sets to discover things about your attackers
- Make recommendations on what actions a company can take to protect themselves
KRUSTY KRAB

About this module:
A beginner-friendly intro to pivoting and analysis. You will be defending a underwater restaurant against miniature adversaries.
Objectives:
- Apply foundational security analysis skills to analyze security log data
- Pivot between datasets using indicators or patterns of interest
- Identify tactics, techniques, and procedures (TTPs) based on observed threat activity
- Cluster patterns of threat activity based on overlaps in adversary tradecraft and TTPs
Turkey Bowl

About this module:
Hungry for a bowl of turkey? You've come to the perfect place! Vangsol hosts an annual Turkey Bowl competition the weekend before Thanksgiving, pitting the rival schools Oxford Academy and Sierra Vista High in a fun filled football game!
Unfortunately, it appears that there have been indications of foul play. You are now tasked with investigating an attack that occurred and discover who is truly behind the attack and their motives.
Objectives:
- How to identify elements of exfiltration
- How to interpret Process Events to identify evidence of malicious activity
- How to navigate command line arguments
A Storm Is Brewing In the Lab

About this module:
We are back at the Envolvelabs research lab, but things aren't so calm this time around. Your job is to safeguard EnvolveLabs, a leading research hub in Ukraine, and its dedicated team from potential cyber threats, especially during these challenging times of the Russian invasion.
In this special module, we leverage Synapse - a versatile central intelligence and analysis system developed by the Vertex Project, to parse through the lab's telemetry and find evidence of malicious activity.
Objectives:
- Pivot on data using Storm and Synapse, learning how to lift, filter, and pivot.
- Learn how to label nodes to form an analytical layer.
- Use multiple data sets to answer targeted questions.
- Investigate cyber activity in logs, including:
- Web traffic
- Server logs
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats).
- Use third-party data sets to discover insights about your attackers.
- Make recommendations on actions a company can take to protect itself.
Balloons Over Iowa

About this module:
Balloons Over Iowa (BOI) is a company that specializes in providing extravagant gender reveal experiences through the rental of high-quality floating balloons. The balloons are purchased from China and are available in various sizes, colors, and designs to match the clients' preferences.
Objectives:
- How to apply foundational security analysis skills to analyze security log data
- How to “pivot” between datasets using indicators or patterns of interest
- How to identify tactics, techniques, and procedures (TTPs) based on observed threat activity
- How to cluster patterns of threat activity based on overlaps in adversary tradecraft and TTPs
Dai Wok Foods

About this module:
Open event for May 13, 2023
Dai Wok Foods is a global food company that has captured the hearts and palates of millions of food enthusiasts around the world.
Objectives:
- Use the Azure Data Explorer
- Use multiple data sets to answer targeted questions
- Investigate cyber activity in logs, including:
- Web traffic
- Server logs
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats)
- Use third-party data sets to discover insights about your attackers
- Make recommendations on actions a company can take to protect itself
Galaxy Neura

About this module:
GalaxyNeura Tech (GNT) is a biotechnology company striving to bring together humanity’s soft fleshy body and the most advanced computer technology. They believe cyberpunk should not only be something to experience in video games, but something to live. Who hasn’t dreamt of enhancing themselves, right?
But with groundbreaking innovation comes unwanted attention. Threat actors are circling, looking for ways to steal, disrupt, or sabotage GNT’s research. It’s up to you to investigate suspicious activity, uncover the adversary’s tactics, and stop them before they compromise the future of human augmentation.
Do you have what it takes to hunt the threat?
Objectives:
- ✅ Use Azure Data Explorer and Kusto Query Language (KQL) to analyze security data.
- ✅ Investigate suspicious activity targeting GalaxyNeura Tech’s critical research.
- ✅ Identify and track adversary TTPs to map the intrusion lifecycle.
- ✅ Analyze logs for indicators of compromise (IOCs) and detect unauthorized access.
- ✅ Uncover potential insider threats and assess the impact of the breach.
- ✅ Piece together the attack timeline and determine the adversary’s next move.
Inside Encryptodera

About this module:
Encryptodera is a hot new financial company specializing in fancy finance tech, like cryptocurrency, blockchain, and payment gateways. 💰
Despite healthy profit margins, Encryptodera leaders are looking to cut costs by laying off some of their workers. 😭 While nobody is happy about this, some employees are especially upset and have decided to cause some trouble. 😈
In this module, you'll help Encryptodera get to the bottom of a dangerous disgruntled employee 😡, a rambunctious ransomware attack 🤑, and some shady dealings 🥷 happening right under their nose.
Objectives:
In this module, you'll learn:
- How to use Azure Data Explorer (ADX) and Kusto Query Language (KQL) to query logs
- How to decode and interpret encoded malicious commands
- The tactics, and behaviors used by insider threats, and the risks they pose
- How to detect and investigate ransomware attacks
- How attackers move laterally within a network
- How to detect anomalous activity in network flow/packet capture data
Scholomance

About this module:
Scholars and historians speculate that the Scholomance Hidden Enclave has been concealed from the mortal world for centuries if not millennia.
But now hackers are may be trying to unveil those secrets through digital means. It is your job to stop them.
Objectives:
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats)
- Use multiple data sets to answer targeted questions
- Investigate cyber activity in logs including:
- Web traffic
- Server logs
- Use third-party data sets to discover things about your attackers
System Shutdown at Azure Crest! (Short Version)

About this module:
🎮 Dive into the heart of the digital drama at Azure Crest Hospital in this thrilling game module. Navigate a hospital besieged by cyber threats, unravel the ransomware attack, expose risky cost-cutting measures, and restore the hospital's operations. Are you ready to tackle the chaos and save the day?
Objectives:
- How to interpret Security Logs to identify evidence of malicious activity
- How to use Azure Data Explorer (ADX) and Kusto Query Language (KQL) to query logs
- How to interpret PowerShell scripts and malicious commands run by attackers
- How to formulate an analytical question and answer it using data
VirusTotal Fundamentals

About this module:
Specialized tools are handy—if you know how to use them. Cybersecurity analysts are often expected to use VirusTotal but very little training is offered or available. In this module, we spend all our time in VirusTotal. Unlike other VirusTotal training, this module assumes you have a free account and no prior experience with VirusTotal. The course is designed for all skill levels.
VirusTotal is one of many publicly available tools common in cybersecurity. It is currently owned by Google and has become an essential part of cyber investigations.
Objectives:
- Recognize benign files based off of specific details in the report
- Become familiar with finding important details in a report
- Pivot from indicators to learn more about a threat
- Enable you to expand your knowledge of a threat
- Understand the significance of Code-Signing Certificates
- What details about a file can be trusted and which ones should not be
- How to contribute to the community using the platform
Spooky Sweets

About this module:
The Spooky Sweets Candy Company is a renowned confectionery enterprise with a captivating history and a substantial global following. Founded in the early 20th century by the imaginative Wilhelmina "Willy" Whipple, the company has since evolved into a Halloween sensation. Spooky Sweets is celebrated for its inventive and spooky-themed candy creations, contributing significantly to the Halloween spirit.
Objectives:
- Use multiple data sets to answer targeted questions
- Investigate cyber activity in logs
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats)
- Use third-party data sets to discover insights about your attackers
- Make recommendations on actions a company can take to protect itself
Sunlands

About this module:
Sunlands Aeronautics and Space Administration (SASA) is the esteemed government agency of the United Sunlands responsible for the civil space program, aeronautics research, and space research.
Objectives:
- Use multiple techniques to track the activity of APTs (Advanced Persistent Threats)
- Use multiple data sets to answer targeted questions
- Investigate cyber activity in logs including:
- Web traffic
- Server logs
- Use third-party data sets to discover things about your attackers
World Domination Nation

About this module:
You just got hired as Junior Security Operations Center (SOC) Analyst at World Domination Nation, a woman-led consulting powerhouse, propels individuals and organizations to unleash their potential through visionary "world domination plans."
Objectives:
- Use Azure Data Explorer (ADX) and Kusto Query Language (KQL) to navigate data
- Investigate a ransomware attack
- Investigate an attack that relies heavily on lateral movement and privilege escalation
A Rap Steak

About this module:
BBL Studios, a secretive powerhouse in the rap game, has brought in high-profile producer MetroBus Boomin to elevate their beats. However, the studio is now caught in the middle of a notorious rap feud, with rumors swirling that a diss track aimed at Dwake could bring dangerous attention to the studio.
As a Security Analyst for BBL Studios, your job is to protect the studio's secrets and ensure that the brewing tensions don't expose the company to new risks.
Objectives:
- Investigate the Techniques, Tactics, and Procedures of one threat actor operating against one victim.
- Understand the exploitation of remote services as a initial access vector
- How to interpret Security Logs to identify evidence of malicious activity
- How to investigate a basic cybersecurity intrusion
MCJ Walker

About this module:
You think you're a decent cyber sleuth now? THINK AGAIN! This game exists for the sole purpose of humbling you. So go ahead and click away to exit this tab, cause you probably don't have it in you 🤣 If indeed you are foolish enough to try, don't say we didn't warn you… 👀
The year is 2323. Washington D.C. has been split into several districts, some districts inhabited, some are simply abandoned relics of the past. Where there is life, there is a sprawling metropolis! Within the industrial district, the Madam C.J. Walker Manufacturing Company stands as a defiant beacon of hope within the industrial district.
This was a custom KC7 challenge built for Defcon 2023.
Objectives:
- Solve a cyber mystery.
- Write some kql queries or whatever
- Try not to cry too much