Recky Arisenta
17th place
8355 points
Awards
Hint 104
hints
Hint for Incident Response Report Submission
0
Hint 58
hints
Hint for Communication Channel Key
-40
Hint 46
hints
Hint for Patient Zero Identification
-20
Hint 106
hints
Hint for Exfiltration Method
-25
Hint 39
hints
Hint for The Fox
-60
Hint 38
hints
Hint for The Fox
-30
Hint 44
hints
Hint for ASN
-20
Hint 14
hints
Hint for Backdoor Gateway
-50
Hint 13
hints
Hint for Backdoor Gateway
-25
Hint 21
hints
Hint for Executable Hunt
-40
Hint 20
hints
Hint for Executable Hunt
-20
Hint 26
hints
Hint for Identity Compromise
-20
Hint 16
hints
Hint for Mining Operation Discovery
-50
Hint 15
hints
Hint for Mining Operation Discovery
-25
Hint 12
hints
Hint for The Origin Point
-50
Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| Incident Response Report Submission | Incident Reporting | 2500 | |
| Attacker Full Name | Threat Hunting | 200 | |
| forked | Threat Hunting | 180 | |
| Telegram ID | Network Forensics | 250 | |
| Communication Channel Key | Network Forensics | 275 | |
| Github Username | Network Forensics | 150 | |
| Data Theft Blueprint | Network Forensics | 210 | |
| Patient Zero Identification | Network Forensics | 200 | |
| Elapsed Time | Network Forensics | 150 | |
| Persistence time | Threat Hunting | 260 | |
| Persistence Technique ID | Threat Hunting | 300 | |
| Persistence Technique action | Threat Hunting | 280 | |
| Exfiltration Method | Threat Hunting | 200 | |
| ASN | Threat Intelligence | 150 | |
| Source Country | Threat Intelligence | 150 | |
| Threat Classification | Threat Intelligence | 150 | |
| Infrastructure Attribution | Threat Intelligence | 150 | |
| Reputation Check | Threat Intelligence | 150 | |
| Backdoor Gateway | SIEM Analysis | 200 | |
| Port of Fortune | SIEM Analysis | 200 | |
| Executable Hunt | SIEM Analysis | 200 | |
| Identity Compromise | SIEM Analysis | 200 | |
| Mining Operation Discovery | SIEM Analysis | 200 | |
| The Origin Point | SIEM Analysis | 200 | |
| New Administrative Account | Alert Triaging | 300 | |
| Suspicious New Domain Access detected | Alert Triaging | 300 | |
| Elevated Privileges Detected | Alert Triaging | 300 | |
| Malicious Web Traffic | Alert Triaging | 300 | |
| Password Reset Activity | Alert Triaging | 300 | |
| 4 - Compromised System Identification | Scenario Reading | 50 | |
| 3 - Security Monitoring Infrastructure | Scenario Reading | 50 | |
| 2 - Incident Timeline | Scenario Reading | 50 | |
| 1 - Company Profile | Scenario Reading | 50 | |
| Sheat Cheet | Sanity Check | 10 | |
| Rules Reading | Sanity Check | 6 | |
| Nama Kapal | Sanity Check | 5 | |
| Nama Tools | Sanity Check | 3 | |
| First President | Sanity Check | 1 |