top of page
LS24_BelgiumLux-41.jpg

How to apply?

To apply for the Cyber Summer School,

01

Download the challenges from this website and try to solve them. Cannot find a flag? Not a problem! The way you arrive at the solution is often more important than the answer itself.

02

Download the registration form. Fill-in your personal data, motivation, and the different flags you have found (or not). It is important that you also provide your approach and reasoning for your attempts, even if you could not fully solve a challenge.

03

Send the registration form to cybersummerschool@mil.be as an attachment not later than 23:59 CEST on 17th May 2026. Any submissions beyond the deadline will not be considered.

04

After analysis of the applications, we will contact you personally to let you know if you have been selected or not.

Registration form

You want to apply for the Cyber Summer School? Download the registration form, fill it in and send it to cybersummerschool@mil.be

The form contains detailed information about the Summer School and the challenges.

Context of the challenges

Election in Belvaria

Challenges are based on the fictional story of the presidential election in Belvaria, a fictional Eastern country of the EU. You are part of the Cyber Rapid Response Team, on the field to counter internal and external interferences with the democratic process...

CySS_Img-35.jpg

#1 
Initial failure

The website of the pro-European candidate is a target of a cyber-attack. A few hours later, we were able to witness a strange anti-European post. You are tasked as a first incident responder to analyze the PCAP file captured during the incident.  

#2 
I spy with my little eyes

A suspicious file is likely to be the source of the attack on the website. As a malware analyst, analyze the file, discover its behavior and determine what is its malicious intent... 

Tournage_Cy-49.jpg
20241215_Foto4.png

#3 
Greetings from Belgium

A suspicious message was discovered in a postcard, sent to a known hostile group. Given the timing and the actors involved, a concrete threat can be feared. Discover if and when an attack is planned. 

​

A parallel investigation determined the "To:" and "From:" addresses are decoys. Do not take them into account. 

#4
Little thumb

A USB drop attack happened at the pro-EU candidate's HQ, likely linked to the attack on the website. As a forensics analyst, discover what's inside the USB and who is the potential owner. 

Tournage_Cy-19.jpg
dsc_5913_edited.jpg

#5
Hidden in plain wav

A vocal message was left on a target's voicemail. Due to the suspicious audio features, you are tasked to analyze it and discover if a hidden message lies inside the audio. 

#6
Campaign bloopers

The pro-EU candidate's website seems to have been modified to undermine his credibility, a day before the election. Find a way to uncover who is responsible for the malicious activity. 

/!\ Read the instructions inside the registration form very carefully to complete this challenge, no file is to be downloaded /!\

CySS24_Next©QMoonen-37.jpg
Visite-MOD©QuentinMoonen-7-scaled.jpg

#7
The debrief

At the end of the mission, your supervisors ask you for a debrief. They prepared several questions for you before delivering their conclusions to our Minister of Defense. To help you, one of your colleague prepared a brief report about Belvaria's geopolitical context. 

© 2026 by CYBER FORCE

bottom of page