Scoreboard has been frozen
Solves
Challenge | Category | Value | Time |
---|---|---|---|
Sneaky 2FA Credential Harvester | Phishing Kits | 100 | |
Brute Ratel | Offensive Security Tools Continued | 25 | |
Brute Ratel | Offensive Security Tools Continued | 80 | |
What is the c2 server fingerprint? | Malware pivots | 85 | |
Unknown malware on a users computer | Malware pivots | 25 | |
Brute Ratel | Offensive Security Tools Continued | 25 | |
FlowerStorm Phishing Kit | Phishing Tools | 100 | |
Geolocating the C2 Infrastructure | OST Tools | 70 | |
Identifying Common Traits of These C2 Servers | OST Tools | 60 | |
Havoc Framework C2 Profiling | OST Tools | 50 | |
SSL Certificate Tracking | OST Tools | 40 | |
Fingerprinting the C2 in Shodan | OST Tools | 30 | |
Ransomware Deployment via ShadowPad | APT Groups: China | 20 | |
Attribution of the C2 Server | OST Tools | 20 | |
Identifying the Command-and-Control (C2) Server | OST Tools | 10 | |
Expanding the Hunt | RAT | 40 | |
Identifying RAT Activity in UK CNI Networks | RAT | 30 | |
Following the Adversary’s Trail | RAT | 20 | |
A Familiar Face in the Dark | RAT | 10 |