Level 1: Domain controller, 225 / 850 (26%)
26.470588235294% complete
Level 2: W10-PC3, 150 / 1,050 (14%)
14.285714285714% complete
Level 3: W10-PC5, 0 / 1,150 (0%)
Total: 375 / 3,050 (12.3%)
Challenge |
Solved |
Points |
06. Which privileged account has been used by the attackers ?
(Level 2: W10-PC3)
|
#59,
1 year, 10 months after release (2024-12-20 10:20:42)
|
50 |
05. The attackers are quite sassy ... but sloppy too. Can you locate the password for one of this accounts?
(Level 2: W10-PC3)
|
#64,
4 years, 1 month after release (2024-12-20 10:20:27)
|
100 |
03. At what time can you see a logon type 10 user login on the domain controller?
(Level 1: Domain controller)
|
#93,
4 years, 1 month after release (2024-12-19 14:59:55)
|
50 |
02. At which time can the second malicious GPO be considered as loaded and ready to be applied?
(Level 1: Domain controller)
|
#87,
4 years, 1 month after release (2024-12-19 14:51:54)
|
100 |
01- What is the name of the first anomalous GPO?
(Level 1: Domain controller)
|
#82,
1 year, 10 months after release (2024-12-19 14:49:00)
|
75 |