Level 1: Domain controller, 525 / 850 (62%)
61.764705882353% complete
Level 2: W10-PC3, 100 / 1,050 (10%)
9.5238095238095% complete
Level 3: W10-PC5, 0 / 1,150 (0%)
0% complete
Total: 625 / 3,050 (20.5%)
Challenge Solved Points
02. At which time can the second malicious GPO be considered as loaded and ready to be applied? (Level 1: Domain controller) #7, 5 months, 4 days after release (2021-04-16 18:02:58) 100
04. This machine is listening in a really odd port for an endpoint. Which one? (Level 2: W10-PC3) #5, 2 months, 3 days after release (2021-01-13 19:15:17) 50
03. What is the external IP used by the attackers? (Level 2: W10-PC3) #5, 2 months, 3 days after release (2021-01-13 19:06:19) 50
09_Extra. Which kind of authentication used the attacker to log into the system? (Level 1: Domain controller) #5, 1 month, 23 days after release (2021-01-04 21:44:30) 100
09. What is the IP used by the attackers to connect to the domain controller ? (Level 1: Domain controller) #5, 1 month, 23 days after release (2021-01-04 21:16:56) 25
08_Extra: There is a GPO in the disk that sets a value for the Group Policy Refresh. What is the time between cheks? (Level 1: Domain controller) #5, 1 month, 23 days after release (2021-01-04 21:15:56) 100
07. Which ransomware family are the attackers planning to deploy? (Level 1: Domain controller) #5, 1 month, 23 days after release (2021-01-04 20:58:44) 50
04. A foul-mouthed named script was executed a little after this user login. What is its name? (Level 1: Domain controller) #5, 1 month, 23 days after release (2021-01-04 20:25:35) 50
05. The antivirus detected a malicious file around this time. Which name does it have? (Level 1: Domain controller) #5, 1 month, 23 days after release (2021-01-04 20:14:50) 50
03. At what time can you see a logon type 10 user login on the domain controller? (Level 1: Domain controller) #6, 1 month, 23 days after release (2021-01-04 20:10:38) 50