Level 1: Domain controller, 200 / 850 (24%)
23.529411764706% complete
Level 2: W10-PC3, 350 / 1,050 (33%)
33.333333333333% complete
Level 3: W10-PC5, 0 / 1,150 (0%)
Total: 550 / 3,050 (18%)
| Challenge |
Solved |
Points |
|
07. How many different users did login on this computer on November 9 ?
(Level 2: W10-PC3)
|
#108,
4 years, 11 months after release (2025-11-04 13:05:49)
|
75 |
|
05. The attackers are quite sassy ... but sloppy too. Can you locate the password for one of this accounts?
(Level 2: W10-PC3)
|
#109,
4 years, 11 months after release (2025-11-04 12:41:23)
|
100 |
|
04. This machine is listening in a really odd port for an endpoint. Which one?
(Level 2: W10-PC3)
|
#120,
4 years, 11 months after release (2025-11-04 12:22:52)
|
50 |
|
03. What is the external IP used by the attackers?
(Level 2: W10-PC3)
|
#115,
4 years, 11 months after release (2025-11-04 12:14:33)
|
50 |
|
02. This malicious execution is used to launch another known threat. At what UTC time?
(Level 2: W10-PC3)
|
#104,
4 years, 11 months after release (2025-11-04 12:04:12)
|
75 |
|
06. Which specific threat is launched by the AV detection?
(Level 1: Domain controller)
|
#115,
2 years, 8 months after release (2025-11-04 10:00:46)
|
75 |
|
05. The antivirus detected a malicious file around this time. Which name does it have?
(Level 1: Domain controller)
|
#156,
4 years, 11 months after release (2025-11-04 09:36:36)
|
50 |
|
01- What is the name of the first anomalous GPO?
(Level 1: Domain controller)
|
#157,
2 years, 8 months after release (2025-11-04 08:56:11)
|
75 |