SecurityAura

41st place

1180 points


Awards


Hint 62

hints

Hint for Hookbot Panels - Fingerprint 2

-5


Solves

Challenge Category Value Time
Hookbot Panels - Fingerprint 2 Commodity Malware 50
Following the Adversary’s Trail Starting Point 25
OST Tools - Covenant C2 (1) OST Tools 30
OST Tools - Covenant C2 (2) OST Tools 20
OST Tools - Covenant C2 (3) OST Tools 15
Pivoting 101 - 3 Pivoting 101 20
Pivoting 101 - 2 Pivoting 101 20
Hookbot Panels - Fingerprint 1 Commodity Malware 50
Expanding the Hunt Starting Point 100
Understanding the Threat Landscape Starting Point 25
Lactrodectus 3 Commodity Malware 25
Lactrodectus 2 Commodity Malware 25
Chaos C2 - Defaults OST Tools 55
OST - SSL Certificate Tracking OST Tools 50
Brute Ratel 1 OST Tools 25
Hunting Phishing Infrastructure Starting Point 100
Impersonating cloud services Starting Point 25
The Economics of Phishing-as-a-Service Starting Point 25
Identifying RAT Activity in UK CNI Networks Starting Point 25
A Familiar Face in the Dark Starting Point 25
Lactrodectus 1 Commodity Malware 25
Pivoting 101 - 1 Pivoting 101 15
Iranian APT Tracking 2 Nation State - Iran 25
Iranian APT Tracking Nation State - Iran 25
Who are they impersonating? Chinese Malware 25
The Evolution of Chinese Malware Chinese Malware 25
Chinese Malware - APT Espionage Targeting Chinese Malware 25
Ransomware Deployment via ShadowPad Chinese Malware 25
Chinese Malware - Identifying ShadowPad Infrastructure Chinese Malware 10
SSL JARM analysis of the C2 Infrastructure Chinese Malware 50
Havoc - Geolocating the C2 Infrastructure OST Tools 50
OST Tools - Attributing the C2 server properties OST Tools 75
OST - Fingerprinting the C2 in Shodan OST Tools 25
OST - Attribution of the C2 Server OST Tools 25
OST - Identifying the Command-and-Control (C2) Server OST Tools 25