Challenge | Solved | Points |
---|---|---|
04_Extra: How this file arrived to the domain controller? (Level 1: Domain controller) | #5, 2 years after release (2022-12-12 02:27:32) | 100 |
09. What is the IP used by the attackers to connect to the domain controller ? (Level 1: Domain controller) | #13, 2 years after release (2022-12-11 19:20:25) | 25 |
08. The GPO establish a fixed time for ransomware execution. Which time are the scheduled tasks of doom timed to start? (Level 1: Domain controller) | #12, 2 years after release (2022-12-11 19:09:51) | 75 |
07. Which ransomware family are the attackers planning to deploy? (Level 1: Domain controller) | #12, 2 years after release (2022-12-11 18:36:01) | 50 |
04. A foul-mouthed named script was executed a little after this user login. What is its name? (Level 1: Domain controller) | #15, 2 years after release (2022-12-11 16:41:17) | 50 |
05. The antivirus detected a malicious file around this time. Which name does it have? (Level 1: Domain controller) | #17, 2 years after release (2022-12-11 16:20:44) | 50 |
03. At what time can you see a logon type 10 user login on the domain controller? (Level 1: Domain controller) | #17, 2 years after release (2022-12-11 16:06:42) | 50 |