aam.sudrajat

Indonesia

9th place

10463 points

Awards


Hint 104

hints

Hint for Incident Response Report Submission

0


Hint 121

hints

Hint for The Money Trail 2

-5


Hint 12

hints

Hint for The Origin Point

-50


Hint 7

hints

Hint for Suspicious New Domain Access detected

0


Hint 3

hints

Hint for Malicious Web Traffic

0


Hint 1

hints

Hint for Password Reset Activity

0


Hint 119

hints

Hint for Nama Kapal

3


Solves

Challenge Category Value Time
Incident Response Report Submission Incident Reporting 2500
Persistence time Threat Hunting 260
Persistence Technique ID Threat Hunting 300
Persistence Technique action Threat Hunting 280
Attacker Full Name Threat Hunting 200
Exfiltration Method Threat Hunting 200
forked Threat Hunting 180
Telegram ID Network Forensics 250
Communication Channel Key Network Forensics 275
Github Username Network Forensics 150
Data Theft Blueprint Network Forensics 210
Patient Zero Identification Network Forensics 200
Elapsed Time Network Forensics 150
Identity Compromise SIEM Analysis 200
Executable Hunt SIEM Analysis 200
The Money Trail 2 Memory Forensics 350
The Money Trail Memory Forensics 350
Mining Pool Endpoint Memory Forensics 200
Process Identifier Hunt Memory Forensics 200
Parent Memory Forensics 150
Service Exposure Point Memory Forensics 100
ssh port Memory Forensics 95
Phantom Process Memory Forensics 90
Port of Fortune SIEM Analysis 200
Mining Operation Discovery SIEM Analysis 200
Backdoor Gateway SIEM Analysis 200
The Origin Point SIEM Analysis 200
ASN Threat Intelligence 150
Source Country Threat Intelligence 150
The Fox Threat Intelligence 150
Threat Classification Threat Intelligence 150
Reputation Check Threat Intelligence 150
Infrastructure Attribution Threat Intelligence 150
New Administrative Account Alert Triaging 300
Suspicious New Domain Access detected Alert Triaging 300
Elevated Privileges Detected Alert Triaging 300
Malicious Web Traffic Alert Triaging 300
Password Reset Activity Alert Triaging 300
4 - Compromised System Identification Scenario Reading 50
3 - Security Monitoring Infrastructure Scenario Reading 50
2 - Incident Timeline Scenario Reading 50
1 - Company Profile Scenario Reading 50
Sheat Cheet Sanity Check 10
Nama Kapal Sanity Check 5
Rules Reading Sanity Check 6
Nama Tools Sanity Check 3
First President Sanity Check 1