Request Demo
Introduction
Introduction
System hostage-taking
System hostage-taking
Social engineering
Social engineering

Welcome to the club

You start your workday unsuspectingly. Your computer indicates that an update needs to be installed. After rebooting, a video link from an unknown source suddenly appears on your screen. A dark voice speaks to you: PhantomX. The atmosphere of your desktop changes abruptly. Welcome to the team of cybercriminals. Your system has been taken hostage. All you can do is listen to regain control of your system.

Social engineering

You find yourself face to face with PhantomX. He explains that you have just fallen for one of his tricks. But you get a chance. Together with him, you will explore the world of cybercrime. Namely, he wants you to perform a hack on your own company. Only then will you regain control of your systems. The introduction includes:

  • A connection to PhantomX instructing you on cybercrime.
  • Find out why you are the target.
  • Learn what social engineering entails.
  • Fully personalized for your business, with your own name and email environment.

Setting up a VPN

You have just been hacked by PhantomX. Together with him, you take on the ultimate challenge: hacking your company and colleagues. But first you have to get onto the web completely anonymously. Using a VPN connection, you make sure your IP address is masked. With PhantomX's help, you then anonymously execute his cunning plan.

Game: Anonymity

You will create connections through the program in order to hide your IP address. This will cover the following topics:

  • How to ensure anonymity (via a VPN).
  • The benefits of masking your IP address.
  • Surf safely without leaving your mark.
  • Connect to different servers around the world.

See the other levels

Do you have what it takes to become a real hacker? Discover all the levels and get to know the different subjects of the Cyber Kill Chain.

Outing requests