Recky Arisenta

17th place

8355 points

Awards


Hint 104

hints

Hint for Incident Response Report Submission

0


Hint 58

hints

Hint for Communication Channel Key

-40


Hint 46

hints

Hint for Patient Zero Identification

-20


Hint 106

hints

Hint for Exfiltration Method

-25


Hint 39

hints

Hint for The Fox

-60


Hint 38

hints

Hint for The Fox

-30


Hint 44

hints

Hint for ASN

-20


Hint 14

hints

Hint for Backdoor Gateway

-50


Hint 13

hints

Hint for Backdoor Gateway

-25


Hint 21

hints

Hint for Executable Hunt

-40


Hint 20

hints

Hint for Executable Hunt

-20


Hint 26

hints

Hint for Identity Compromise

-20


Hint 16

hints

Hint for Mining Operation Discovery

-50


Hint 15

hints

Hint for Mining Operation Discovery

-25


Hint 12

hints

Hint for The Origin Point

-50


Solves

Challenge Category Value Time
Incident Response Report Submission Incident Reporting 2500
Attacker Full Name Threat Hunting 200
forked Threat Hunting 180
Telegram ID Network Forensics 250
Communication Channel Key Network Forensics 275
Github Username Network Forensics 150
Data Theft Blueprint Network Forensics 210
Patient Zero Identification Network Forensics 200
Elapsed Time Network Forensics 150
Persistence time Threat Hunting 260
Persistence Technique ID Threat Hunting 300
Persistence Technique action Threat Hunting 280
Exfiltration Method Threat Hunting 200
ASN Threat Intelligence 150
Source Country Threat Intelligence 150
Threat Classification Threat Intelligence 150
Infrastructure Attribution Threat Intelligence 150
Reputation Check Threat Intelligence 150
Backdoor Gateway SIEM Analysis 200
Port of Fortune SIEM Analysis 200
Executable Hunt SIEM Analysis 200
Identity Compromise SIEM Analysis 200
Mining Operation Discovery SIEM Analysis 200
The Origin Point SIEM Analysis 200
New Administrative Account Alert Triaging 300
Suspicious New Domain Access detected Alert Triaging 300
Elevated Privileges Detected Alert Triaging 300
Malicious Web Traffic Alert Triaging 300
Password Reset Activity Alert Triaging 300
4 - Compromised System Identification Scenario Reading 50
3 - Security Monitoring Infrastructure Scenario Reading 50
2 - Incident Timeline Scenario Reading 50
1 - Company Profile Scenario Reading 50
Sheat Cheet Sanity Check 10
Rules Reading Sanity Check 6
Nama Kapal Sanity Check 5
Nama Tools Sanity Check 3
First President Sanity Check 1