terence

United Kingdom

32nd place

1285 points


Awards


Solves

Challenge Category Value Time
Pivoting 101 - 3 Pivoting 101 20
Pivoting 101 - 2 Pivoting 101 20
Pivoting 101 - 1 Pivoting 101 15
SSL JARM analysis of the C2 Infrastructure Chinese Malware 50
The Evolution of Chinese Malware Chinese Malware 25
Who are they impersonating? Chinese Malware 25
Lactrodectus 1 Commodity Malware 25
Chinese Malware - APT Espionage Targeting Chinese Malware 25
Ransomware Deployment via ShadowPad Chinese Malware 25
Chinese Malware - Identifying ShadowPad Infrastructure Chinese Malware 10
Iranian APT Tracking 2 Nation State - Iran 25
Iranian APT Tracking Nation State - Iran 25
Expanding the Hunt Starting Point 100
Lactrodectus 3 Commodity Malware 25
Lactrodectus 2 Commodity Malware 25
OST Tools - Covenant C2 (3) OST Tools 15
Brute Ratel 3 OST Tools 100
Hunting Phishing Infrastructure Starting Point 100
Impersonating cloud services Starting Point 25
The Economics of Phishing-as-a-Service Starting Point 25
Understanding the Threat Landscape Starting Point 25
Identifying RAT Activity in UK CNI Networks Starting Point 25
Havoc - Identifying Common Traits of These C2 Servers OST Tools 100
Havoc Framework C2 Profiling OST Tools 100
OST Tools - Attributing the C2 server properties OST Tools 75
Chaos C2 - Defaults OST Tools 55
Havoc - Geolocating the C2 Infrastructure OST Tools 50
Brute Ratel 1 OST Tools 25
OST - SSL Certificate Tracking OST Tools 50
OST - Fingerprinting the C2 in Shodan OST Tools 25
OST - Attribution of the C2 Server OST Tools 25
OST - Identifying the Command-and-Control (C2) Server OST Tools 25