Cybersecurity Lunch Adventure

Instructions: Use the arrow keys to navigate locations and complete your tasks. If you find yourself at a pop-up screen within the game, press Escape to close it and return to the overworld. Click on the dialogue boxes to continue reading or close the dialogue. For text-based prompts, hit Enter to submit your input.

CONGRATULATIONS!

You've completed all the cybersecurity puzzles and collected enough evidence to prove that these four restuarants on Green Street have committed fraud. We can now turn this evidence over to the authorities. Great work!


~

Hints for computer puzzle

Click on the button below to get a hint for this puzzle. To go back to the game, press ESCAPE.

Hints for toast puzzle

Click on the button below to get a hint for this puzzle. To go back to the game, press ESCAPE.

Hints for fridge puzzle

Click on the button below to get a hint for this puzzle. To go back to the game, press ESCAPE.

Hints for coffee puzzle

Click on the button below to get a hint for this puzzle. To go back to the game, press ESCAPE.


Remaining Destinations:

- Checkers 🍕

- Moonbucks ☕

- Teamote 🧋

- CFK 🍗

We took inspiration from Capture The Flag (CTF) competitions in designing the puzzles you just solved and tried to make them a bit beginner-friendly. CTF competitions are a great way to learn more about cybersecurity, though they definitely aren't the only way.


Or, if you're not into CTFs, some things you can do are generally learn more about operating systems (especially Linux), improve your programming skills, read CTF challenge write-ups, or watch talks from DEF CON (an annual security conference) to get inspired about interesting security topics.


Some additional links:

- https://overthewire.org/wargames/ is a great way to gain confidence navigating the Linux command-line and learning some common code exploits.

- https://picoctf.org/ is a fantastic starting point if you want to dive a bit deeper than our game goes.

- https://ctftime.org/ lists upcoming CTFs if you’re looking for more past picoCTF.


Resources

SQL Tutorial

SQL Guide

Phishing Emails

CSRF Attacks

Navigating a Command-Line Interface

Networks