Alte Jakobstr. 79-80
10179 Berlin, de
+49 (30) 2325777-0
Net.Attack - The macmon Exit Game
The challenge is back
Christian Anding, Head of Marketing by macmon secure GmbH: "The subject of network security is being addressed very innovatively in a playful way with our escape game Net.Attack. Our channel sales partners have a great opportunity to uniquely position NAC and engage in customer discussions. It quickly becomes clear that macmon NAC is a flexible and efficient NAC solution that can be implemented quickly, while providing significant value for enterprise network security. Because with NAC, a spy just stays out there. "
What do you need to play the game?
The Exit Game consists of an app and a high-quality game box containing the rules of the game and six envelopes with instructions for the tasks to be solved. The focus is on a highly paid spy who is supposed to steal secret research data from a multimillion dollar corporation, which are located on a central server of the data center. On its way to the server room and thus the internal network access, the spy has to solve various tasks in order to overcome the comprehensive security measures. The spy moves from room to room in the app, which he can access only if he solves the tricky puzzles in each room. Some of them are only solvable in the combination of hints in the app and in the game set. The game can be played alone, but also in a team. The duration of the game is about 45 - 60 minutes. Besides the theme as such, the special feature is the combination of the app and the game set. Partners can easily order the game set online directly from macmon secure GmbH and download the app via the Google Play or App Store. Partners simply refer to their partner manager or distribution partner.
Journalists can now order the free Net.Attack game set: https://www.macmon.eu/bestellung-netattack
A noisy tune into the world of spies can be found here: https://www.youtube.com/watch?v=m-8cUGsPwCk
What is the task?
You are a highly paid and hitherto unrecognized spy and have been hired to steal secret research data from a multimillion dollar corporation. After a thorough research, however, you know that the data are stored only on the central servers in the data center, which cannot be accessed from the outside. The firewalls are good and staggered in several levels. After overcoming the first firewall, honey pots have made it so difficult for you to take further steps that you have almost been stunned. After all, you've been able to identify and embarrass some e-mails, use a link and infiltrate a Trojan that contains various exploits and is likely to be active. Since you are already warned about the comprehensive security measures, you have decided not to set up a direct connection and only communicate within the network.
Your goal is therefore to gain access to the corporate environment and connect directly to the network. In the meantime, your Trojan should have searched the network for building plans to show you the way to the server room. Without an authorized local network access you do not get at it ...
Are you ready for the ultimate challenge?
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to email@example.com.