Boss of the SOC 2.0 Dataset, Questions and Answers Open-Sourced and Ready for Download

tl;dr: Click here to register and get access to open sourced BOTS 2.0 dataset!

It's hard to believe a year has passed since we released the Boss of the SOC (BOTS) Scoring Server, Questions and Answers, along with the BOTS 1.0 Dataset. During that time, BOTS has continued to grow at a breakneck pace. Last October, we hosted one of the largest single in-person capture the flag (CTF) events ever with over 700 participants joining us in Orlando, Florida to compete in the debut of BOTS 3.0. We also ran the largest-ever cybersecurity challenge in Australia, along with dozens of smaller events around the globe. All this helped drive the program to surpass the 10,000 participant mark overall since its inception.

WHAT Are We Releasing?

BOTS 2.0! During the past year, BOTS 2.0 (debuted at .conf in September 2017) has been our workhorse event, and became so popular that our team had to write a second question set (and then a third) to satisfy demand. BOTS 2.0 marked a dramatic expansion in scope over its predecessor, including five scenarios covering topics like advanced persistent threat, endpoint security, web application security, fraud and insider threat. It was created with the same attention to detail and commitment to realism that made BOTS 1.0 so popular.

Today, as BOTS 3.0 events become the new standard, we make good on our promise to release the BOTS 2.0 dataset along with its original question and answer set.

BOTS 2.0 Dataset

The BOTS 2.0 dataset is hosted on Github and Amazon S3 and comes in one of two forms:

BOSS Scoring App

The scoring app continues to dutifully (if not stylishly) power every BOTS and BOTN event both big and small. As enhancements are made to the scoring app, they're released directly via GitHub. Some notable improvements made in the last year include:

BOTS 2.0 Questions and Answers

We're happy to send you a copy of the BOTS 2.0 questions and answers upon request! All you have to do is register here.

What Can I Do with BOTS 2.0?

A whole lot! Over the past year, the BOTS 1.0 dataset has been downloaded hundreds of times and used for training, self-study, research, and of course, to recreate the BOTS CTF experience. Additionally, it has become common practice for security analysts and engineers to test new detection methods against the realistic BOTS dataset.

We'd love to hear how you use the data, so please feel free to tweet @splunk with #BossoftheSOC and share!

Is All This Stuff Really Free?

Yep, pretty much. The dataset, scoring apps and questions are distributed with licenses based on Creative Commons CCO. Of course, you’ll need a Splunk Enterprise instance to run all this on. If you have a Splunk license, great! If not, no worries—everything described in this post can be deployed on the free Splunk Enterprise trial version. The dataset is pre-indexed during packaging to avoid data ingest restrictions; packaging data in this way is unconventional, so please read the instructions carefully.

Those who have experienced a Splunk-run BOTS 2.0 event will recall that it included Splunk Enterprise Security (ES). Splunk ES is not included in the open source release of the BOTS 2.0 dataset and questions, but if you’d like to experience BOTS 2.0 with Splunk Enterprise Security, please reach out to your Splunk account team.

Thanks again for being part of this incredible journey!

Sincerely,

Dave Herrald
Ryan Kovar

----------------------------------------------------
Thanks!
Dave Herrald

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.