Level 1: Domain controller, 525 / 850 (62%)
61.764705882353% complete
Level 2: W10-PC3, 100 / 1,050 (10%)
9.5238095238095% complete
Level 3: W10-PC5, 0 / 1,150 (0%)
Total: 625 / 3,050 (20.5%)
Challenge |
Solved |
Points |
02. At which time can the second malicious GPO be considered as loaded and ready to be applied?
(Level 1: Domain controller)
|
#7,
5 months, 4 days after release (2021-04-16 18:02:58)
|
100 |
04. This machine is listening in a really odd port for an endpoint. Which one?
(Level 2: W10-PC3)
|
#5,
2 months, 3 days after release (2021-01-13 19:15:17)
|
50 |
03. What is the external IP used by the attackers?
(Level 2: W10-PC3)
|
#5,
2 months, 3 days after release (2021-01-13 19:06:19)
|
50 |
09_Extra. Which kind of authentication used the attacker to log into the system?
(Level 1: Domain controller)
|
#5,
1 month, 23 days after release (2021-01-04 21:44:30)
|
100 |
09. What is the IP used by the attackers to connect to the domain controller ?
(Level 1: Domain controller)
|
#5,
1 month, 23 days after release (2021-01-04 21:16:56)
|
25 |
08_Extra: There is a GPO in the disk that sets a value for the Group Policy Refresh. What is the time between cheks?
(Level 1: Domain controller)
|
#5,
1 month, 23 days after release (2021-01-04 21:15:56)
|
100 |
07. Which ransomware family are the attackers planning to deploy?
(Level 1: Domain controller)
|
#5,
1 month, 23 days after release (2021-01-04 20:58:44)
|
50 |
04. A foul-mouthed named script was executed a little after this user login. What is its name?
(Level 1: Domain controller)
|
#5,
1 month, 23 days after release (2021-01-04 20:25:35)
|
50 |
05. The antivirus detected a malicious file around this time. Which name does it have?
(Level 1: Domain controller)
|
#5,
1 month, 23 days after release (2021-01-04 20:14:50)
|
50 |
03. At what time can you see a logon type 10 user login on the domain controller?
(Level 1: Domain controller)
|
#6,
1 month, 23 days after release (2021-01-04 20:10:38)
|
50 |