P3nyu
52nd place
635 points
Awards
Hint 65
hints
Hint for PolarEdge BackDoor
-30
Hint 64
hints
Hint for PolarEdge BackDoor
-30
Hint 62
hints
Hint for Hookbot Panels - Fingerprint 2
-5
Hint 57
hints
Hint for Chaos C2 - Fingerprint 2
-10
Hint 59
hints
Hint for Chaos C2 - Fingerprint 3
-25
Hint 63
hints
Hint for Sneaky 2FA Credential Harvester
-10
Solves
| Challenge | Category | Value | Time |
| Chaos C2 - Fingerprint 3 | OST Tools | 100 | |
| OST Tools - Attributing the C2 server properties | OST Tools | 75 | |
| Understanding the Threat Landscape | Starting Point | 25 | |
| Identifying RAT Activity in UK CNI Networks | Starting Point | 25 | |
| A Familiar Face in the Dark | Starting Point | 25 | |
| Hunting Phishing Infrastructure | Starting Point | 100 | |
| Pivoting 101 - 1 | Pivoting 101 | 15 | |
| Chaos C2 - Defaults | OST Tools | 55 | |
| Havoc - Geolocating the C2 Infrastructure | OST Tools | 50 | |
| Havoc Framework C2 Profiling | OST Tools | 100 | |
| Havoc - Identifying Common Traits of These C2 Servers | OST Tools | 100 | |
| OST - Fingerprinting the C2 in Shodan | OST Tools | 25 | |
| OST - Attribution of the C2 Server | OST Tools | 25 | |
| OST - Identifying the Command-and-Control (C2) Server | OST Tools | 25 |