Awards
Hint 10
hints
Hint for GhostLog Case 7
-15
Hint 9
hints
Hint for GhostLog Case 7
-15
Hint 8
hints
Hint for GhostLog Case 7
-15
Hint 7
hints
Hint for GhostLog Case 6
-15
Hint 6
hints
Hint for GhostLog Case 6
-15
Hint 22
hints
Hint for GhostLog Case 5
-10
Hint 5
hints
Hint for GhostLog Case 5
-15
Hint 21
hints
Hint for GhostLog Case 2
-5
Hint 14
hints
Hint for Incident Zero Case 2
-20
Hint 13
hints
Hint for Incident Zero Case 2
-20
Hint 4
hints
Hint for Incident Zero Case 2
-20
Hint 3
hints
Hint for Incident Zero Case 2
-20
Hint 20
hints
Hint for Incident Zero Case 7
-5
Hint 19
hints
Hint for Incident Zero Case 6
-5
Hint 18
hints
Hint for Incident Zero Case 6
-5
Hint 17
hints
Hint for Incident Zero Case 5
-5
Hint 16
hints
Hint for Incident Zero Case 5
-5
Hint 15
hints
Hint for Incident Zero Case 3
-5
Hint 2
hints
Hint for Blackout Trace Case 9
-10
Hint 1
hints
Hint for Attack Vector Case 3
-20
Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| GhostLog Case 12 | Malware analysis | 50 | |
| GhostLog Case 11 | Malware analysis | 50 | |
| GhostLog Case 10 | Malware analysis | 50 | |
| GhostLog Case 9 | Malware analysis | 100 | |
| GhostLog Case 8 | Malware analysis | 90 | |
| GhostLog Case 7 | Malware analysis | 80 | |
| GhostLog Case 6 | Malware analysis | 75 | |
| GhostLog Case 5 | Malware analysis | 70 | |
| GhostLog Case 4 | Malware analysis | 50 | |
| GhostLog Case 3 | Malware analysis | 50 | |
| GhostLog Case 2 | Malware analysis | 50 | |
| GhostLog Case 1 | Malware analysis | 50 | |
| Incident Zero Case 9 | Threat Hunting | 25 | |
| Incident Zero Case 8 | Threat Hunting | 25 | |
| Incident Zero Case 7 | Threat Hunting | 25 | |
| Incident Zero Case 6 | Threat Hunting | 25 | |
| Incident Zero Case 5 | Threat Hunting | 25 | |
| Incident Zero Case 4 | Threat Hunting | 25 | |
| Incident Zero Case 3 | Threat Hunting | 25 | |
| Incident Zero Case 2 | Threat Hunting | 100 | |
| Incident Zero Case 1 | Threat Hunting | 25 | |
| Incident Zero | Threat Hunting | 0 | |
| Blackout Trace Case 14 | Threat Intelligence | 25 | |
| Blackout Trace Case 13 | Threat Intelligence | 25 | |
| Blackout Trace Case 12 | Threat Intelligence | 25 | |
| Blackout Trace Case 11 | Threat Intelligence | 25 | |
| Blackout Trace Case 10 | Threat Intelligence | 25 | |
| Blackout Trace Case 9 | Threat Intelligence | 25 | |
| Blackout Trace Case 8 | Threat Intelligence | 25 | |
| Blackout Trace Case 7 | Threat Intelligence | 25 | |
| Blackout Trace Case 6 | Threat Intelligence | 25 | |
| Blackout Trace Case 5 | Threat Intelligence | 25 | |
| Blackout Trace | Threat Intelligence | 0 | |
| Blackout Trace Case 4 | Threat Intelligence | 25 | |
| Blackout Trace Case 3 | Threat Intelligence | 25 | |
| Blackout Trace Case 2 | Threat Intelligence | 25 | |
| Blackout Trace Case 1 | Threat Intelligence | 25 | |
| Attack Vector | Incident Response | 0 | |
| Attack Vector Case 8 | Incident Response | 25 | |
| Attack Vector Case 7 | Incident Response | 25 | |
| Attack Vector Case 6 | Incident Response | 25 | |
| Attack Vector Case 5 | Incident Response | 25 | |
| Attack Vector Case 4 | Incident Response | 25 | |
| Attack Vector Case 3 | Incident Response | 60 | |
| Attack Vector Case 2 | Incident Response | 25 | |
| Attack Vector Case 1 | Incident Response | 25 |