Want to make creations as awesome as this one?

Transcript

Escape the mundane.

START

PROCEED

  • Play solo or with friends.
  • Set timer for 60 minutes.
  • The entire screen is your playground - pay close attention.
  • Use critical thinking to solve puzzles.
  • Interact with objects and enter passcodes to proceed.
  • Take help of hints.
  • Enjoy the experience and have a good time.

the rulebook

PROCEED

BACK

PROCEED

BACK

question 1/4

Which is a strong password?

123456

Gh7hjejk

123456

abcdef

P@ssw0rd!

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

BACK

123456

question 2/4

What is social engineering?

Fake Information

Hack

Skill

Algorithm

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

BACK

123456

question 3/4

How to secure a Wide Area Network (WAN) network?

Defaults

Updates

Firewall

Sharing

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

BACK

123456

question 4/4

Purpose of data encryption?

Security

Capacity

Access

Latency

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

Oops That's not quite right. Give it another shot!"

PROCEED

Hello Department of National Security as you stare at your compromised screens, contemplate the extent of my power, you are vulnerable to my abilities, since you didn't secure your systems properly, I beg you to reconsider your cybersecurity practices because the dangers lie in my shadows are much worse than I can ever imagine, strengthen your defenses or be forever vulnerable...

ENTER PASSWORD

02Nov1988!

View between the...

PROCEED

Ah, so you've managed to survive the first stage, have you? Impressive, but don't get too comfortable just yet. I must admit, your performance was better than expected. But don't think for a second that it will be so easy moving forward. You must have received two emails why don't you check Hahahahahaha.....

Read the email properly

Read the email properly

BACK

PROCEED

Monument of Ezra Cornell - $ten050

Stimpson hall - $two9383

Schoellkop field - &twelve2839

Cornell cinema - &five289

Engineering library - &nine9287

Stimpson hall- %seventeen839

Robinson alumni fields - ^nine0338

BACK

PROCEED

Cornell store - %thirteen383

Noyes communityrecreation hall - @four3829

bard thurston kimball hall - $seven8383

Sage chapel - !eight3839

Uris hall - &ten38349

Hans bethe house - ^twenty3849

Check for the correct email

Sage chapel

Hmm... it seems the password is wrong!

Recheck the emails

PROCEED

B

C

NC

B

M

12

30

V

V

SO

91

E

D

@

I

L

P

X

HJ

W

F

U

PY

J

ct

R

PROCEED

Congratulations on reaching the end of the third stage, my worthy opponent. I must admit, you've surpassed my expectations. You have proven to be a worthy opponent, but the time has come for our ultimate clash! This is one last test for you so listen carefully to the next part. If you complete this stage... I will surrender my friend! Hahahaha

PROCEED

END GAME

I stand before you, defeated and humbled, my worthy opponent.Your triumph over me in this cybersecurity game is a testament to your unparalleled skill, unwavering determination, and the depth of your cybersecurity knowledge. As I promised I reveal myself as Robert Tappan Morris a.k.a Morris Worm. May you have gleaned valuable insights from your endeavours, but do not falter in your vigilance, for I have unleashed my latest creation, an A I virus. Stay ever informed and updated, as this digital menace emerges to challenge your preparedness.