Capture the Flag Events
Welcome to our Capture the Flag events!
Our Services
-

Magnet Virtual Summit 2026
The Magnet Virtual Summit 2026 CTF promises to be another exciting competition! Top DFIR experts will be participating in the challenge, but all skill levels will have the chance to flex their skills.
Thursday, February 26 // 11:00AM – 2:00PM ET
Please note registration for this event closes end of day February 23. Images and download links will be sent out on February 24.
-

Capture the Flag Workshop
Tips for competing in the Magnet Virtual Summit CTF with hands-on practice. Monday February 23rd 12:00 PM EST Register here
Capture The Flag workshop: tips for competing in the Magnet Virtual Summit CTF with hands-on practice
Multiple Magnet Summit CTF winner, Kevin Pagano and multiple Magnet Virtual Summit CTF author, Jessica Hyde, will host a Capture The Flag workshop to share tips and strategies on how to succeed in a CTF event. This session will help prepare you to compete in a Capture The Flag contest. As part of this talk, we will review CTF style questions and best practices for solving or participating in your first CTF.
-

MSAB Mobile Forensics Digital Summit 2026
Get ready to play ball at our MSAB Capture the Flag showdown. We’re gearing up for this high-stakes tournament — a three-hour sprint where your digital forensics game will be put to the test. Join MSAB and Hexordia on the playing field and go head-to-head with other contenders in a friendly skills competition led by CTF creator Jessica Hyde.
What to Know
Game Day is March 12, 11:00 AM – 2:00 PM ET
Register by Friday, February 27, 2026.
Your playbook (images and links) will be sent by Monday, March 2.
Check out our blogs from the 2025 Magnet Virtual Summit!
Our Services
-
Penetration tests expand on the work completed in vulnerability assessments and provide additional insight into how the vulnerabilities identified in your network could be exploited. They are a simulated attack on a system, network, or infrastructure, to identify and exploit vulnerabilities, and assess the security posture of the target environment. The purpose of a penetration test is to uncover potential security weaknesses before malicious actors can exploit them, and to provide recommendations for improving the security posture of an Organization. The methodology, tooling, and attack vectors of penetration testing depends on the system, network, or infrastructure to be assessed, but the process of penetration testing can be applied to internal networks, external networks, cloud environments, web applications, and even physical locations.
-
A vulnerability Scan and Assessment is your first exposure to Offensive Security services. It is an automated discovery and cataloging of vulnerabilities to give you an overview of your infrastructure’s security posture.
-
Penetration tests on external networks involve assessing the security of systems and infrastructure accessible from outside the organization, typically from the internet, to identify vulnerabilities and potential entry points for attackers.
-
These tests focus on evaluating the security of systems, servers, and devices within an organization's internal network, aiming to uncover vulnerabilities that could be exploited by insiders or attackers who have gained internal access.
-
Penetration tests on cloud environments evaluate the security of cloud-based infrastructure, services, and applications, examining potential weaknesses or misconfigurations that could compromise data stored or processed in the cloud.
-
This type of penetration test involves assessing the security of web applications, examining their code, functionalities, and interfaces to identify vulnerabilities such as SQL injection, cross-site scripting, or insecure authentication methods.
-
Penetration tests on mobile applications assess the security of apps designed for smartphones or tablets, scrutinizing potential weaknesses in the app's code, data storage, authentication mechanisms, or network communication that could be exploited by attackers.
-
This form of testing focuses on evaluating the security of Application Programming Interfaces (APIs), which facilitate communication and data exchange between different software systems. API penetration testing aims to identify vulnerabilities in how APIs handle requests, access controls, authentication mechanisms, and data protection, ensuring the secure and reliable operation of the interfaces.
Title Here
Subtitle Here
Title Here
Customized Learning Paths: Tailored courses for all skill levels, ensuring each team member receives training relevant to their expertise.
Hands-On Experience: Our courses include practical labs, allowing participants to apply theoretical knowledge in real-world scenarios.
Expert Instructors:
Learn from seasoned professionals with extensive experience in the field of digital forensics.
Comprehensive Curriculum: Covering a wide range of topics, from mobile forensics to macOS investigations and IoT device analysis.
Post-Training Support: We provide ongoing support and resources to ensure continuous learning and skill development.
Elevate Your Team's Digital Forensic Expertise
Title Here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras aliquet erat sit amet metus tempus, vel rhoncus justo iaculis. Vestibulum ac vehicula sem, sed dictum mauris. Ut mauris nisl, finibus finibus commodo ac, aliquam efficitur est. Nulla facilisi. Maecenas pharetra lectus magna, in euismod urna blandit et.