Awards
Hint 15
hints
Hint for Incident Zero Case 3
-5
Hint 1
hints
Hint for Attack Vector Case 3
-20
Hint 21
hints
Hint for GhostLog Case 2
-5
Hint 10
hints
Hint for GhostLog Case 7
-15
Hint 9
hints
Hint for GhostLog Case 7
-15
Hint 8
hints
Hint for GhostLog Case 7
-15
Hint 7
hints
Hint for GhostLog Case 6
-15
Hint 6
hints
Hint for GhostLog Case 6
-15
Hint 22
hints
Hint for GhostLog Case 5
-10
Hint 5
hints
Hint for GhostLog Case 5
-15
Hint 12
hints
Hint for Endpoint Intrusion Case 7
-10
Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| GhostLog Case 12 | Malware analysis | 50 | |
| GhostLog Case 11 | Malware analysis | 50 | |
| GhostLog Case 10 | Malware analysis | 50 | |
| GhostLog Case 9 | Malware analysis | 100 | |
| GhostLog Case 8 | Malware analysis | 90 | |
| GhostLog Case 7 | Malware analysis | 80 | |
| GhostLog Case 6 | Malware analysis | 75 | |
| GhostLog Case 5 | Malware analysis | 70 | |
| GhostLog Case 4 | Malware analysis | 50 | |
| GhostLog Case 3 | Malware analysis | 50 | |
| GhostLog Case 2 | Malware analysis | 50 | |
| GhostLog Case 1 | Malware analysis | 50 | |
| GhostLog | Malware analysis | 0 | |
| Endpoint Intrusion Case 9 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case 8 | Incident Response / SOC Analysis | 60 | |
| Endpoint Intrusion Case 7 | Incident Response / SOC Analysis | 80 | |
| Endpoint Intrusion Case 6 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case 5 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case 4 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case 3 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case 2 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case 1 | Incident Response / SOC Analysis | 50 | |
| Endpoint Intrusion Case | Incident Response / SOC Analysis | 0 |