NCC Group has created a few challenges over the years that are good starting points for getting into relatively niche areas of information security. Here can be found analysis of several of the standouts.
The NCC Hardware and Embedded Systems The NCC Cryptographic Services division also has an excellent wargame with a decade-long pedigree. group has produced top-notch hacking challenges that are a boon to anyone looking to become more familiar with that subject area. The original set has been out for nearly a decade and is worth reviewing to get a baseline understanding of firmware reverse engineering and modern Assuming a relatively loose definition of "modern." exploit development. They also announced a new series of six challenges on October 31st, 2022. The latter set is interesting because of its adjacency to hardware security—invaluable for those wishing to learn how to exploit flaws in secure boot implementations or try their hand at black box analysis against secure element APIs.
These challenges highlight types of vulnerabilities that NCC Group’s Hardware and Embedded Systems practice have discovered in real products. — Jennifer Fernick, NCC Group
Only two writeups are published for the new series, likely because only a few dozen people on Earth have working exploits at the time of writing. The following pages comprise the first complete guide available on the internet. Any embargo on spoilers should reasonably be over after a year.