testuser

5th place

10515 points


Solves

Challenge Category Value Time
Identity Compromise SIEM Analysis 200
Executable Hunt SIEM Analysis 200
Port of Fortune SIEM Analysis 200
Mining Operation Discovery SIEM Analysis 200
Backdoor Gateway SIEM Analysis 200
The Origin Point SIEM Analysis 200
New Administrative Account Alert Triaging 300
Suspicious New Domain Access detected Alert Triaging 300
Elevated Privileges Detected Alert Triaging 300
Malicious Web Traffic Alert Triaging 300
Password Reset Activity Alert Triaging 300
Persistence time Threat Hunting 260
The Money Trail 2 Memory Forensics 350
Persistence Technique ID Threat Hunting 300
forked Threat Hunting 180
4 - Compromised System Identification Scenario Reading 50
3 - Security Monitoring Infrastructure Scenario Reading 50
2 - Incident Timeline Scenario Reading 50
Incident Response Report Submission Incident Reporting 2500
The Money Trail Memory Forensics 350
Attacker Full Name Threat Hunting 200
Telegram ID Network Forensics 250
Github Username Network Forensics 150
Persistence Technique action Threat Hunting 280
1 - Company Profile Scenario Reading 50
The Fox Threat Intelligence 150
Communication Channel Key Network Forensics 275
Data Theft Blueprint Network Forensics 210
ssh port Memory Forensics 95
Parent Memory Forensics 150
Service Exposure Point Memory Forensics 100
Mining Pool Endpoint Memory Forensics 200
ASN Threat Intelligence 150
Source Country Threat Intelligence 150
Threat Classification Threat Intelligence 150
Sheat Cheet Sanity Check 10
Process Identifier Hunt Memory Forensics 200
Patient Zero Identification Network Forensics 200
Rules Reading Sanity Check 6
Exfiltration Method Threat Hunting 200
Elapsed Time Network Forensics 150
Phantom Process Memory Forensics 90
Infrastructure Attribution Threat Intelligence 150
Reputation Check Threat Intelligence 150
Nama Tools Sanity Check 3
Nama Kapal Sanity Check 5
First President Sanity Check 1