lesion.io Blog
CtrlK
  • Roadmap
  • Docs
    • Templates
      • Data Inventory
      • Access Control
      • Cybersecurity Roles & Responsibilities
      • Asset Inventory
      • Acceptable Use Policy
      • Change Management
      • Vendor Risk Assessment Form
      • Password Protection Policy
  • Articles
    • 2025
      • Why Every Business Needs a Solid Business Continuity Plan — And How to Start One (2 minute read)
      • Vulnerability Scanning - What is it and why does it matter? (2 minute read)
      • Social Engineering - How attackers take advantage of the weakest link
  • About Us
    • Manifesto
    • Metrics
  • CTF Team
    • CISA ICS CTF 2024
      • Virbank
        • Mission: Inconceivable - 1
        • Mission: Inconceivable - 2
        • Extend Your Stay - 1
        • Extend Your Stay - 2
        • Extend Your Stay - 3
        • Extend Your Stay - 4
        • Follow The Charts - 1
        • Follow The Charts - 2
        • Read Askew Manuscripts - 1
        • Read Askew Manuscripts - 2
        • Read Askew Manuscripts - 3
        • Read Askew Manuscripts - 4
        • Read Askew Manuscripts - 5
      • Anville
        • Genisys of the Problems - 1
        • Genisys of the Problems - 2
        • Genisys of the Problems - 3
        • Modeling Trains - 1
        • Modeling Trains - 2
        • Modeling Trains - 3
      • Castelia
        • Page
      • Driftviel
        • Page 1
Powered by GitBook
On this page

Was this helpful?

CTF Team

lesion.io has an internal CTF (Capture the Flag) Team that competes in cybersecurity CTF Competitions around the world. Here we document our write ups and supplementary material.

CISA ICS CTF 2024
PreviousMetricsNextCISA ICS CTF 2024

Was this helpful?