
For military training exercises, see Military exercise.įor other, similar terms, see War Game. This article is about the cyber-security contest. Wargames can be used to teach the basics of web attacks and web security, giving participants a better understanding of how attackers exploit security vulnerabilities.

Wargames are also used as a method of cyberwarfare preparedness.

A wargame usually involves a capture the flag logicbased on pentestingsemantic URL attacksknowledge-based authenticationpassword crackingreverse engineering of software often JavaScriptC and assembly languagecode injectionSQL injectionscross-site scriptingexploitsIP address spoofingforensicsand other hacking techniques. In hackinga wargame or war game is a cyber-security challenge and mind sport in which the competitors must exploit or defend a vulnerability in a system or application, or gain or prevent access to a computer system.
