Scoreboard has been frozen
Solves
Challenge | Category | Value | Time |
---|---|---|---|
Unknown malware on a users computer | Malware pivots | 25 | |
Sneaky 2FA Credential Harvester | Phishing Kits | 100 | |
Attribution of the C2 Server | OST Tools | 20 | |
Identifying the Command-and-Control (C2) Server | OST Tools | 10 | |
Hunting Phishing Infrastructure | Phishing Kits | 40 | |
Impersonating cloud services | Phishing Kits | 30 | |
The Economics of Phishing-as-a-Service | Phishing Kits | 20 | |
Understanding the Threat Landscape | Phishing Kits | 10 | |
Identifying RAT Activity in UK CNI Networks | RAT | 30 |