top of page
LS24_BelgiumLux-41.jpg

How to apply?

To apply for the Cyber Summer School,

01

Download all the challenges from this page and try to solve them. Cannot find a flag? Not a problem! The way you arrive at the solution is often more important than the answer itself.

02

Download the registration form. Fill-in your personal data, motivation, and the different flags you have found (or not). It is important that you also provide your approach and reasoning for your attempts, even if you could not fully solve a challenge.

03

Send the registration form to cybersummerschool@mil.be as an attachment not later than 23:59 CEST on 1st May 2025. Any submissions beyond the deadline will not be considered.

04

After analysis of the applications, we will contact you personally to let you know if you have been selected or not.

Registration form

You want to apply for the Cyber Summer School? Download the registration form, fill it in and send it to cybersummerschool@mil.be!

Tournage_Cy-19.jpg

01

What is the key again?

After a reconnaissance operation on a target's assets, the Digital Forensic team extracted all potentially suspect files. One of them caught the operators' attention. They asked you to analyze it further to understand what it is about and whether any potential information could be found.

02

Data in translit

A Russian target under surveillance attempted to send a compressed file to a foreign agent. The communication was intercepted and the file recovered. However, the file is password protected.  Help the Digital Forensic team to crack it!

CySS_Img-15-2.jpg
CySS_Img-36.jpg

03

The mysterious VM

The Digital Forensic team acquired a target's computer containing an unusual virtual machine. After extracting the RAM of this machine, the team asked you to analyze it. Find out what the target is trying to hide!

04

Do you know the law?

You are a consultant for a Belgian SME operating in the energy sector, with 40 employees and a turnover of 9 million euros. The company plans to expand rapidly over the next year. However, no specific cybersecurity program has been put in place.

Tournage_Cy-49.jpg
VisiteCHODVansina©QuentinMoonen-14-1024x682.jpg

05

What's up target?

A target of interest is followed on social media. An intelligence analyst saw that this target had posted 3 photos on X (formerly Twitter). These photos caught the analyst's attention because they are unusual. You are asked to find out what the target is up to.

06

Is it safe for prod?

You are part of the vulnerability assessment team. You are tasked to assess the vulnerabilities of an application being developed, aimed to be launched in a critical environment. Analyze then give your recommendations to improve the security of the application!

1741964178757.jpeg
qr-code-quick-response-code-scanning-to-scan-069a2e8f7e0433f5584ca27f62e4f41e.jpg

07

QR-Codanography

A mysterious QR code has been shared between high-value targets. After analysis, it appears that no QR code reader can read or extract the information it contains. You are tasked with discovering the content of this QR code.

08

The Data Leak

A data leak containing confidential professional data of a Belgian diplomat on mission in Ukraine occurred last week. The SGRS/ADIV asked the diplomat for an incident briefing to understand how the leak occurred. Help to find out what might have happened.

jrs-1137-e240cd4b7b.webp

© 2025 by CYBER COMMAND

bottom of page