Skip to content

CMD+CTRL Cyber Range

CMD+CTRL Cyber Range, by Security Innovation, is a browser-based cybersecurity training and capture-the-flag (CTF) platform. It hosts intentionally vulnerable web applications, APIs, and cloud environments where players earn points by finding and exploiting real vulnerabilities. It is used by security teams for hands-on skills development, hiring assessments, and security awareness programs. A free trial launched in 2026 lets individuals and small teams get started without a purchase.

Installation

CMD+CTRL is a fully hosted SaaS platform — no local installation is required. Access is through your browser.

Access Options

# Free trial signup (2026)
# Visit: https://cmdandctrl.net/trial
# - No credit card required
# - Access to beginner challenge modules
# - Up to 5 team members

# Browser requirements
# Chrome 110+ or Firefox 110+ recommended
# Disable aggressive ad-blockers (may block challenge assets)
# JavaScript must be enabled

CLI Companion Tool (optional)

# Install cmdctrl CLI for score tracking and session management
pip install cmdctrl-cli

# Or with npm
npm install -g @securityinnovation/cmdctrl-cli

# Authenticate
cmdctrl login --token $CMDCTRL_API_TOKEN

# Verify
cmdctrl whoami

CTF Event Hosting Setup

# For organizations hosting private CTF events
# Download the event management CLI
curl -sSL https://cmdandctrl.net/cli/install.sh | bash

# Initialize new event
cmdctrl event init \
  --name "Acme Corp Pentest Challenge 2026" \
  --type ctf \
  --duration 8h \
  --max-teams 20

# Generate team invite links
cmdctrl event invite --event acme-2026 --teams 20

Configuration

Profile Setup

# Set up your player profile via CLI
cmdctrl profile set \
  --display-name "h4x0r42" \
  --timezone "America/New_York" \
  --skill-level intermediate   # beginner | intermediate | advanced

# View your current profile
cmdctrl profile show

# Set notification preferences (hint unlocks, new challenges)
cmdctrl profile notifications \
  --email-on-new-challenge \
  --email-on-hint-unlock

Team Configuration

# Create a team
cmdctrl team create --name "DevSecOps Tigers" --size 5

# Invite members (generates join link)
cmdctrl team invite --team-id TEAM-1234

# Set team captain
cmdctrl team set-captain --user alice@company.com

# View team dashboard
cmdctrl team dashboard --team-id TEAM-1234

Event Manager Configuration (for admins)

# Configure challenge set for a training event
cmdctrl event configure \
  --event acme-2026 \
  --modules "web-app-basics,api-security,auth-bypass" \
  --difficulty intermediate \
  --hints-allowed true \
  --hint-penalty 50    # points deducted per hint used

# Set scoring weights
cmdctrl event scoring \
  --first-blood-bonus 200 \
  --time-decay-enabled \
  --time-decay-interval 30m \
  --time-decay-percent 10

Core Commands

CommandDescription
cmdctrl login --token <token>Authenticate with API token
cmdctrl whoamiShow current user and team
cmdctrl challenges listList available challenges
cmdctrl challenges list --module <name>Filter challenges by module
cmdctrl challenges start <id>Launch a challenge environment
cmdctrl challenges submit --id <id> --flag <flag>Submit a captured flag
cmdctrl challenges hints --id <id>List available hints for a challenge
cmdctrl challenges hints unlock --id <id> --hint 1Unlock a specific hint
cmdctrl challenges reset --id <id>Reset a challenge environment
cmdctrl score showShow your current score and rank
cmdctrl score leaderboardShow team/event leaderboard
cmdctrl score historyShow your flag submission history
cmdctrl team dashboardOpen team performance dashboard
cmdctrl event listList events you are enrolled in
cmdctrl event join --code <code>Join an event with invite code

Advanced Usage

Challenge Navigation

# List all modules and their challenges
cmdctrl challenges list --verbose

# Filter by category and difficulty
cmdctrl challenges list \
  --category "injection" \
  --difficulty "intermediate" \
  --status unsolved

# Get full details on a challenge
cmdctrl challenges info --id CHAL-0042

# Start challenge and open in browser
cmdctrl challenges start --id CHAL-0042 --open

Scoring and Progress Tracking

CommandDescription
cmdctrl score show --user <name>Show score for another player
cmdctrl score leaderboard --top 10Show top 10 players
cmdctrl score leaderboard --teamShow team leaderboard
cmdctrl score export --format csvExport score history
cmdctrl progress --module web-app-basicsShow module completion %
cmdctrl progress --allShow overall completion across all modules

Session Management

# List active challenge sessions
cmdctrl sessions list

# Extend a session before it expires
cmdctrl sessions extend --id sess-abc123 --minutes 60

# Save session notes locally
cmdctrl sessions notes --id sess-abc123 \
  --add "Found IDOR at /api/v1/users/{id} - auth check missing"

# End a session cleanly
cmdctrl sessions end --id sess-abc123

Admin: Event Management

# Monitor live event progress
cmdctrl event monitor --event acme-2026

# Export participant scores mid-event
cmdctrl event scores --event acme-2026 --format csv

# Add time to a running event
cmdctrl event extend --event acme-2026 --minutes 30

# Broadcast message to all participants
cmdctrl event announce \
  --event acme-2026 \
  --message "30 minutes remaining! API Security module is now worth 2x points."

# Generate post-event report
cmdctrl event report \
  --event acme-2026 \
  --format pdf \
  --include "scores,challenge-stats,time-to-solve"

Integrations

# Export results to Slack
cmdctrl event scores --event acme-2026 --format slack-webhook \
  --webhook $SLACK_WEBHOOK_URL

# Push scores to a Google Sheet
cmdctrl event scores --event acme-2026 --format gsheet \
  --sheet-id $GOOGLE_SHEET_ID

# Generate certificates for top performers
cmdctrl event certificates \
  --event acme-2026 \
  --top 3 \
  --format pdf \
  --output ./certificates/

Common Workflows

Individual Skills Development Path

# 1. Check which modules are available
cmdctrl challenges list --verbose

# 2. Start with a beginner web module
cmdctrl challenges list --module web-app-basics --difficulty beginner
cmdctrl challenges start --id CHAL-0001 --open

# 3. Work through challenges in order; use hints sparingly
cmdctrl challenges hints --id CHAL-0001       # see what hints exist
cmdctrl challenges hints unlock --id CHAL-0001 --hint 1  # unlock first hint

# 4. Submit captured flag
cmdctrl challenges submit --id CHAL-0001 --flag "FLAG{sql1_is_cl4ss1c}"

# 5. Track progress
cmdctrl progress --module web-app-basics
cmdctrl score show

Team Training Event Setup

# 1. Create event with appropriate modules for skill level
cmdctrl event init \
  --name "Q2 Security Training" \
  --type training \
  --modules "web-app-basics,api-security,auth-bypass" \
  --difficulty beginner \
  --duration 4h

# 2. Generate and distribute invite links
cmdctrl event invite --event q2-training --teams 10 | tee invite-links.txt

# 3. Monitor participation on the day
cmdctrl event monitor --event q2-training --refresh 30s

# 4. Capture results after the event
cmdctrl event report \
  --event q2-training \
  --format pdf \
  --output q2-training-results.pdf

# 5. Identify skill gaps from results
cmdctrl event scores --event q2-training --sort unsolved-challenges

Hiring Assessment Workflow

# 1. Create a timed assessment event
cmdctrl event init \
  --name "Security Engineer Assessment - May 2026" \
  --type assessment \
  --modules "web-app-basics,api-security,network-recon" \
  --difficulty intermediate \
  --duration 2h \
  --max-teams 1    # solo assessment

# 2. Generate unique invite link per candidate
cmdctrl event invite --event hiring-may2026 --count 5 --unique

# 3. Review results after each candidate completes
cmdctrl event scores \
  --event hiring-may2026 \
  --include "time-to-solve,hints-used,first-blood"

Tips and Best Practices

  • Work through challenges in order within each module — later challenges often build on techniques from earlier ones
  • Try each challenge for 30 minutes before using a hint — the struggle is where learning happens; hints cost points
  • Take notes in cmdctrl sessions notes as you work so you can reference your approach in post-event debriefs
  • Use Burp Suite Community Edition alongside CMD+CTRL challenges for web app hacking — it pairs naturally with the platform’s HTTP-based challenges
  • Read HTTP responses fully in every challenge — flags and clues are often hidden in headers, cookies, or response bodies
  • For API security challenges, check for BOLA/IDOR vulnerabilities by incrementing numeric IDs in endpoints
  • Reset the environment with cmdctrl challenges reset if you break the application state — a clean environment is often faster than debugging a broken one
  • As a team admin, schedule training events during low-workload weeks and keep them to 2-4 hours to maintain engagement
  • Export scores after events and store them — the platform only retains event data for 90 days after an event ends
  • Use the hiring assessment mode for standardized candidate evaluation — it disables collaboration features and enforces individual completion