nuc_side_front.png

CTF In A Box is designed to be your own inexpensive CTF server at home. It offers an increasing number of vulnerable networks ranging from a call center to a blog farm to a cardholder environment. Our web interface allows you to easily install and configure your vulnerable networks. Be your own CTF Host!

 

 

Download ready-to-go vulnerable virtual machines preconfigured for the Box. Turn on and start hacking while scoreboard tracks all flags captured. 

 

 
 

How does it work?

nuc_top.png

Power on. Connect to our Scoreboard

Start hacking!

 

What's in the box?

whats_in_the_box.png

Vulnerable Machines. Preconfigured Network

. Real World Scenarios, Kali Pen Testing Tool, Cheatsheets. Walkthroughs. And a few easy-to-assemble parts.

 

 

 

Who is it for?

PEN Testers

Improve their offensive skills, develop new attack strategies, and test new offensive tools/tactics against simulated environments.

System Administrators

Train their defensive security skills, test new defensive tools/tactics, practice incident response handling, and test disaster recovery plans in contained networks.

Security Auditors

Practice audit plans through gap assessment exercises, evidence gathering scenarios, and risk mitigation.

 

 

Buy now!

your BOx, ready to ship, ready to play.

We accept VISA, Mastercard, American Express, and Discover. Card payments handled through Stripe.

 
 
CTF In A Box
$499.00

This is for serious game play. Those who want a simulated corporate environment can host real live scenarios with Windows Active Directory, MsSQL, Exchange, or Linux to create a real-live environment.

What's included:
Preconfigured Machines for download
Vulnerable Network
Ready-to-use Kali Pentesting tool
Network-Ready out of the box
Cheatsheets and Walkthroughs

Specifications:
Memory: 16 GB DDR3 RAM
Disk: 240 GB SSD
Graphics: VGA/HDMI Output
Processor: 2.3 Ghz Intel Celeron
Networking: Gigabit Ethernet
Dimensions: 4.55"L x 4.57H  x 2.01"D (115mm x 111mm x 51mm)

Quantity:
Add To Cart
 
 

 

Have Questions? Want to know if you can sell your vulnerable machines on our marketplace? Contact us and we'll respond shortly.

 
 

 

About Us

Building your own CTFs at Home requires countless hours of configuring vulnerable machines and setting up hardware. In the past, we spent hours building vulnerable environments, creating story lines, and setting flags. Now we've built a solution where a press of a button will get you entire environments full of vulnerable servers like mail, web, sql, and real-life scenarios too! 

We've built a ready-to-practice hacking arena.