Level 1: Domain controller, 175 / 850 (21%)
20.588235294118% complete
Level 2: W10-PC3, 175 / 1,050 (17%)
16.666666666667% complete
Level 3: W10-PC5, 75 / 1,150 (7%)
6.5217391304348% complete
Total: 425 / 3,050 (13.9%)
| Challenge |
Solved |
Points |
|
10. Which REAL domain/filename/underwear was used to spoof MINAF? Use the file attached
(Level 3: W10-PC5)
|
#72,
2 years, 8 months after release (2025-11-04 17:18:32)
|
75 |
|
07. How many different users did login on this computer on November 9 ?
(Level 2: W10-PC3)
|
#107,
4 years, 11 months after release (2025-11-04 13:05:46)
|
75 |
|
06. Which privileged account has been used by the attackers ?
(Level 2: W10-PC3)
|
#111,
2 years, 8 months after release (2025-11-04 12:51:06)
|
50 |
|
03. What is the external IP used by the attackers?
(Level 2: W10-PC3)
|
#122,
4 years, 11 months after release (2025-11-04 12:34:41)
|
50 |
|
09_Extra. Which kind of authentication used the attacker to log into the system?
(Level 1: Domain controller)
|
#75,
4 years, 11 months after release (2025-11-04 11:04:54)
|
100 |
|
01- What is the name of the first anomalous GPO?
(Level 1: Domain controller)
|
#158,
2 years, 8 months after release (2025-11-04 08:57:24)
|
75 |