Level 1: MINAF-PC7, 525 / 650 (81%)
80.769230769231% complete
Level 2: Alert! Emergency!, 575 / 750 (77%)
76.666666666667% complete
Level 3: We're not happy, 625 / 725 (86%)
86.206896551724% complete
Total: 1,725 / 2,125 (81.2%)
Challenge Solved Points
3.8 In what time the attackers first set foot on MINAF's O365 infrastructure? (Level 3: We're not happy) #28, 3 years, 7 months after release (2025-07-09 16:50:52) 100
3.6 Before this successful attack, they tried another one, more sneaky but unsucessful. Could you tell the "code" they used? (Level 3: We're not happy) #22, 3 years, 7 months after release (2025-07-09 16:44:22) 100
3.7 From which REAL domain was this last attack launched? (Level 3: We're not happy) #31, 3 years, 7 months after release (2025-07-09 16:39:10) 75
3.4 The compromised user have connecting from another countries ... Which one is the most frequent? (Level 3: We're not happy) #37, 3 years, 7 months after release (2025-07-09 16:29:30) 50
3.3 This kind of attack is EXACTLY called ... (Level 3: We're not happy) #35, 3 years, 7 months after release (2025-07-09 16:27:20) 100
3.2 Who fooled this user to install the "thingy" ? (Level 3: We're not happy) #40, 3 years, 7 months after release (2025-07-09 16:27:07) 75
3.1 Attackers have tricked someone to consent the installation of something. What is its name? (Level 3: We're not happy) #40, 3 years, 7 months after release (2025-07-09 16:21:28) 125
2.9 Which in the "innocent" password of the compromised account ? (Level 2: Alert! Emergency!) #37, 3 years, 7 months after release (2025-07-09 16:15:23) 100
2.8 When the attackers did first successfully use the stolen account ? (Level 2: Alert! Emergency!) #40, 3 years, 7 months after release (2025-07-09 16:11:01) 75
2.7 Attackers have left a privileged backdoor to MINAF's O365. Which form does it take? (Level 2: Alert! Emergency!) #35, 3 years, 7 months after release (2025-07-09 16:03:12) 125
2.6 To expand their activities, the attackers have obtained full access to some mailboxes. Which ones? (Level 2: Alert! Emergency!) #37, 3 years, 7 months after release (2025-07-09 15:55:21) 75
2.5 Attackers also created an email rule that filtered out some keywords. Which ones? (Level 2: Alert! Emergency!) #34, 3 years, 7 months after release (2025-07-09 15:27:26) 75
2.3 ... and from which IP address? (Level 2: Alert! Emergency!) #35, 3 years, 7 months after release (2025-07-09 15:00:17) 50
2.1 María José Feliz shared this file with an user ... who reshared it with a third user. Who? (Level 2: Alert! Emergency!) #44, 3 years, 7 months after release (2025-07-09 14:31:51) 75
1.8 How many times have been the compressed payload successfully executed? (Level 1: MINAF-PC7) #37, 3 years, 7 months after release (2025-07-09 14:27:30) 100
1.9 María José Feliz shared this document with other user. Which one? (Level 1: MINAF-PC7) #47, 3 years, 7 months after release (2025-07-09 14:25:25) 75
1.7 Which user advises Maria Jose Files to "install" everything? (Level 1: MINAF-PC7) #61, 3 years, 7 months after release (2025-07-09 14:25:01) 125
1.3 If you look carefully in the user folder, you'll see some suspicious compressed files. What final (real) extension is the most used? (Level 1: MINAF-PC7) #72, 3 years, 7 months after release (2025-07-09 13:40:06) 50
1.4 Which payload do these files have? (Level 1: MINAF-PC7) #52, 3 years, 7 months after release (2025-07-09 11:55:10) 75
1.2 Which file generated the most recent AV alert? (Level 1: MINAF-PC7) #71, 3 years, 7 months after release (2025-07-09 11:31:33) 50
1.1 At which time did María José Feliz create the document "World_Happiness_Plan.docx" on her computer? (Level 1: MINAF-PC7) #61, 3 years, 7 months after release (2025-07-09 11:19:47) 50