Hi friends! Welcome back to the channel. I’m Ash 27, a cybersecurity enthusiast and I’m thrilled to be sharing my thoughts and experience with you on the 24th day of the Advent of Cyber challenge.
Today, I’ll be discussing two tasks that were a part of day 24, both numbered 29 and 30. The first task was a feedback form, which was a way to show appreciation for everyone who participated in the event and to gather feedback to help improve the event for future years.
The feedback form was a simple Google form asking questions about our favourite security category, difficulty of the event, which best described us, what we enjoyed the most about the secure coding tasks, and how we think the event could be improved for next year.
I answered the questions honestly, mentioning that I liked all the categories and that red teaming and blue teaming were my favourite. I found the event to be around a 7/10 in terms of difficulty, but with the added pressure of making videos, it felt like a more challenging task. I mentioned that I preferred to read everything in detail, but when I’m on my own, I tend to skim through the task content.
Regarding the secure coding tasks, I appreciated the interactive code editor and found it to be a unique aspect of the challenge. I don’t have any suggestions for improvements as I think the event was well organized and the different rooms were written by different people, giving a variety of perspectives and flavours to the challenges.
At the end of the feedback form, there was a flag to grab, and I submitted the form with the flag. The winners of the prize will be announced on 28th December, so I’m keeping my fingers crossed for a win.
In conclusion, I have thoroughly enjoyed participating in the Advent of Cyber challenge and I plan to go back through some of the rooms and focus on the pre-security room in the new year. I would definitely recommend the challenge to anyone looking to improve their cybersecurity knowledge and skills.
Stay tuned for more updates and experiences from the world of cybersecurity.