Level 1: Domain controller, 325 / 850 (38%)
38.235294117647% complete
Level 2: W10-PC3, 75 / 1,050 (7%)
7.1428571428571% complete
Level 3: W10-PC5, 0 / 1,150 (0%)
Total: 400 / 3,050 (13.1%)
| Challenge |
Solved |
Points |
|
07. How many different users did login on this computer on November 9 ?
(Level 2: W10-PC3)
|
#126,
5 years, 2 months after release (2026-02-03 14:55:42)
|
75 |
|
09. What is the IP used by the attackers to connect to the domain controller ?
(Level 1: Domain controller)
|
#146,
5 years, 2 months after release (2026-02-03 11:05:03)
|
25 |
|
08. The GPO establish a fixed time for ransomware execution. Which time are the scheduled tasks of doom timed to start?
(Level 1: Domain controller)
|
#147,
5 years, 2 months after release (2026-02-03 11:02:41)
|
75 |
|
03. At what time can you see a logon type 10 user login on the domain controller?
(Level 1: Domain controller)
|
#177,
5 years, 2 months after release (2026-02-03 09:41:06)
|
50 |
|
02. At which time can the second malicious GPO be considered as loaded and ready to be applied?
(Level 1: Domain controller)
|
#171,
5 years, 2 months after release (2026-02-03 09:11:08)
|
100 |
|
01- What is the name of the first anomalous GPO?
(Level 1: Domain controller)
|
#167,
2 years, 11 months after release (2026-02-03 09:05:09)
|
75 |