Level 1: Domain controller Points Solved by First solvers
01- What is the name of the first anomalous GPO? 75 69% First to solve this challenge!Secun
Second to solve this challenge!GabberBro
Third to solve this challenge!imnotarobot
02. At which time can the second malicious GPO be considered as loaded and ready to be applied? 100 81% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Ximo
03. At what time can you see a logon type 10 user login on the domain controller? 50 91% First to solve this challenge!adriandlhc
Second to solve this challenge!bob
Third to solve this challenge!Asere Jévere
04. A foul-mouthed named script was executed a little after this user login. What is its name? 50 87% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Ximo
04_Extra: How this file arrived to the domain controller? 100 33% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Ximo
05. The antivirus detected a malicious file around this time. Which name does it have? 50 91% First to solve this challenge!adriandlhc
Second to solve this challenge!Asere Jévere
Third to solve this challenge!LosChunguitos
06. Which specific threat is launched by the AV detection? 75 55% First to solve this challenge!Gonzalo
Second to solve this challenge!GabberBro
Third to solve this challenge!Toni
07. Which ransomware family are the attackers planning to deploy? 50 79% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Ximo
08. The GPO establish a fixed time for ransomware execution. Which time are the scheduled tasks of doom timed to start? 75 75% First to solve this challenge!LosChunguitos
Second to solve this challenge!Ximo
Third to solve this challenge!adriandlhc
08_Extra: There is a GPO in the disk that sets a value for the Group Policy Refresh. What is the time between cheks? 100 54% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Ximo
09. What is the IP used by the attackers to connect to the domain controller ? 25 82% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Ximo
09_Extra. Which kind of authentication used the attacker to log into the system? 100 63% First to solve this challenge!adriandlhc
Second to solve this challenge!Ximo
Third to solve this challenge!LosChunguitos
Level 2: W10-PC3 Points Solved by First solvers
01. Which execution pinpoints the first lateral movement on this machine? 50 69% First to solve this challenge!Asere Jévere
Second to solve this challenge!LosChunguitos
Third to solve this challenge!adriandlhc
02. This malicious execution is used to launch another known threat. At what UTC time? 75 61% First to solve this challenge!LosChunguitos
Second to solve this challenge!Asere Jévere
Third to solve this challenge!adriandlhc
03. What is the external IP used by the attackers? 50 75% First to solve this challenge!adriandlhc
Second to solve this challenge!Ximo
Third to solve this challenge!LosChunguitos
04. This machine is listening in a really odd port for an endpoint. Which one? 50 76% First to solve this challenge!adriandlhc
Second to solve this challenge!Ximo
Third to solve this challenge!LosChunguitos
05. The attackers are quite sassy ... but sloppy too. Can you locate the password for one of this accounts? 100 67% First to solve this challenge!adriandlhc
Second to solve this challenge!LosChunguitos
Third to solve this challenge!Asere Jévere
06. Which privileged account has been used by the attackers ? 50 60% First to solve this challenge!Secun
Second to solve this challenge!GabberBro
Third to solve this challenge!imnotarobot
06_extra. How many times did the attackers login on the DC from a user of this computer ? 125 24% First to solve this challenge!Asere Jévere
Second to solve this challenge!adriandlhc
Third to solve this challenge!Fran C
07. How many different users did login on this computer on November 9 ? 75 67% First to solve this challenge!Asere Jévere
Second to solve this challenge!adriandlhc
Third to solve this challenge!Deckcard23
08. What EXACT authentication data from dom.adm account has been compromised ? 200 37% First to solve this challenge!Asere Jévere
Second to solve this challenge!adriandlhc
Third to solve this challenge!GabberBro
08_extra. The attackers surely have left some persistence on this computer. Find it and give us the name/key/filename/whatever used. 200 21% First to solve this challenge!Asere Jévere
Second to solve this challenge!adriandlhc
Third to solve this challenge!Cyberscope
09. The first question refers to a malicious code execution. What IP addresses did this attack likely came from? 75 48% First to solve this challenge!Asere Jévere
Second to solve this challenge!adriandlhc
Third to solve this challenge!Deckcard23
Level 3: W10-PC5 Points Solved by First solvers
01. What "disguise" has used the executable used to run code on W10-PC3? 50 54% First to solve this challenge!adriandlhc
Second to solve this challenge!Deckcard23
Third to solve this challenge!teamrocket
02. Which script/command/thingy is used by the attackers to disable the antivirus? 100 51% First to solve this challenge!adriandlhc
Second to solve this challenge!Deckcard23
Third to solve this challenge!Cyberscope
03. There are two different C2 used by the attackers. What are their IP? 75 48% First to solve this challenge!Asere Jévere
Second to solve this challenge!adriandlhc
Third to solve this challenge!Cyberscope
04. Attackers have used two Active Directory recon tools. When was the latest one first launched ? 75 39% First to solve this challenge!adriandlhc
Second to solve this challenge!Cyberscope
Third to solve this challenge!teamrocket
05. Which file has an exploit used by the attackers to elevate privileges? 100 40% First to solve this challenge!imnotarobot
Second to solve this challenge!Secun
Third to solve this challenge!kuko__
05_extra. What CVE have exploited the attackers to gain elevated privileges on the system? 200 42% First to solve this challenge!adriandlhc
Second to solve this challenge!Deckcard23
Third to solve this challenge!Cyberscope
06. There is more than one malicious payloads running wild on this machine. When did the second one was deployed? 75 33% First to solve this challenge!adriandlhc
Second to solve this challenge!Asere Jévere
Third to solve this challenge!Deckcard23
07. What is the first recon command made by the attackers ? 75 45% First to solve this challenge!adriandlhc
Second to solve this challenge!Asere Jévere
Third to solve this challenge!Deckcard23
08. This machine is plagued with evil. Name the file who drops the first malicious payload 75 46% First to solve this challenge!adriandlhc
Second to solve this challenge!Asere Jévere
Third to solve this challenge!Deckcard23
09. Here you have the malicious file from the previous question. What payload drops? 100 34% First to solve this challenge!GabberBro
Second to solve this challenge!+q (Forgot Password)
Third to solve this challenge!SierraX
10. Which REAL domain/filename/underwear was used to spoof MINAF? Use the file attached 75 39% First to solve this challenge!imnotarobot
Second to solve this challenge!Toni
Third to solve this challenge!GabberBro
10_extra. With all the evidence you have collected, and having to make a wild guess (attribution is hard, we know it) ... Which country did the attackers came from? 150 34% First to solve this challenge!adriandlhc
Second to solve this challenge!Cyberscope
Third to solve this challenge!teamrocket