Masters of Mankind

1st place

1465 points


Members

User Name Score
Jiayang 315
mark_Langley 310
Eman Captain 840

Awards


Hint 42

hints

Hint for PolarEdge BackDoor

-20


Hint 34

hints

Hint for Sneaky 2FA Credential Harvester

-20


Solves

Challenge Category Value Time
PolarEdge BackDoor So you think you CTI ? 250
Sneaky 2FA Credential Harvester Phishing Kits 100
Pyramid C2 Offensive Security Tools Continued 75
Brute Ratel Offensive Security Tools Continued 25
Brute Ratel Offensive Security Tools Continued 80
What is the c2 server fingerprint? Malware pivots 85
Unknown malware on a users computer Malware pivots 25
Brute Ratel Offensive Security Tools Continued 25
FlowerStorm Phishing Kit Phishing Tools 100
Plug-X APT Groups: China 70
Tracking PlugX Infrastructure APT Groups: China 50
Geolocating the C2 Infrastructure OST Tools 70
Identifying Common Traits of These C2 Servers OST Tools 60
Havoc Framework C2 Profiling OST Tools 50
SSL Certificate Tracking OST Tools 40
Fingerprinting the C2 in Shodan OST Tools 30
Geographical Trends in ShadowPad Activity APT Groups: China 60
APT Espionage Targeting Taiwan APT Groups: China 30
The Evolution of Chinese Malware APT Groups: China 20
Ransomware Deployment via ShadowPad APT Groups: China 20
Hunting Phishing Infrastructure Phishing Kits 40
Attribution of the C2 Server OST Tools 20
Identifying the Command-and-Control (C2) Server OST Tools 10
Identifying ShadowPad Infrastructure APT Groups: China 10
Expanding the Hunt RAT 40
Identifying RAT Activity in UK CNI Networks RAT 30
Following the Adversary’s Trail RAT 20
Impersonating cloud services Phishing Kits 30
The Economics of Phishing-as-a-Service Phishing Kits 20
Understanding the Threat Landscape Phishing Kits 10
A Familiar Face in the Dark RAT 10