RogueOne

49th place

32 points


Members

User Name Score
LH 32

Awards


Hint 114

hints

Hint for DNS Concepts 5

-15


Hint 33

hints

Hint for HTTP Logs 1.5

-25


Hint 45

hints

Hint for HTTP Phishing 6

-25


Hint 15

hints

Hint for Doppelgänger

-25


Hint 117

hints

Hint for TLS 1.3

-15


Hint 121

hints

Hint for IDS meets encryption

-20


Hint 123

hints

Hint for How much data?

-25


Hint 80

hints

Hint for A Virus You Say?

-20


Hint 87

hints

Hint for What is it?

-20


Hint 84

hints

Hint for File Sharing is Caring

-25


Hint 86

hints

Hint for Let me in!

-25


Hint 125

hints

Hint for Secure Document 4

-20


Hint 110

hints

Hint for Invoice 4

-20


Hint 67

hints

Hint for Email Analysis 2.5

-15


Hint 71

hints

Hint for Email Analysis 2.7

-25


Hint 72

hints

Hint for Email Analysis 2.8

-25


Hint 74

hints

Hint for Rogue Device

-20


Hint 78

hints

Hint for An Attempt Was Made...

-25


Hint 90

hints

Hint for Remote Administration

-25


Hint 5

hints

Hint for DNS Concepts 1

-5


Hint 64

hints

Hint for Email Analysis 1.5

-15


Hint 56

hints

Hint for Email Analysis 1.7

-10


Hint 55

hints

Hint for Email Analysis 1.6

-15


Hint 48

hints

Hint for Email Analysis 1.1

-5


Hint 50

hints

Hint for Email Analysis 1.2

-10


Hint 52

hints

Hint for Email Analysis 1.3

-10


Hint 53

hints

Hint for Email Analysis 1.4

-10


Hint 57

hints

Hint for Email Analysis 2.1

-10


Hint 59

hints

Hint for Email Analysis 2.2

-10


Hint 61

hints

Hint for Email Analysis 2.3

-10


Hint 63

hints

Hint for Email Analysis 2.4

-15


Hint 69

hints

Hint for Email Analysis 2.6

-20


Hint 118

hints

Hint for Let's Encrypt!

-20


Hint 82

hints

Hint for USB Device

-20


Hint 116

hints

Hint for HTTP Phishing 8

-25


Hint 46

hints

Hint for HTTP Phishing 7

-20


Hint 44

hints

Hint for HTTP Phishing 5

-25


Hint 42

hints

Hint for HTTP Phishing 4

-10


Hint 41

hints

Hint for HTTP Phishing 3

-25


Hint 39

hints

Hint for HTTP Phishing 2

-25


Hint 37

hints

Hint for HTTP Phishing 1

-25


Hint 35

hints

Hint for HTTP Logs 1.6

-25


Hint 28

hints

Hint for HTTP Logs 1.4

-15


Hint 31

hints

Hint for HTTP Logs 1.3

-20


Hint 26

hints

Hint for HTTP Logs 1.2

-15


Hint 24

hints

Hint for HTTP Logs 1.1

-10


Hint 88

hints

Hint for DNS Concepts 4

-15


Hint 8

hints

Hint for DNS Logs 1

-20


Hint 11

hints

Hint for DNS Logs 2

-20


Hint 13

hints

Hint for External DNS

-25


Hint 91

hints

Hint for Love Letter 1

-20


Hint 93

hints

Hint for Love Letter 2

-20


Hint 94

hints

Hint for Love Letter 3

-20


Hint 96

hints

Hint for Love Letter 4

-20


Hint 98

hints

Hint for Secure Document 1

-15


Hint 100

hints

Hint for Secure Document 2

-20


Hint 102

hints

Hint for Secure Document 3

-25


Hint 108

hints

Hint for Invoice 5

-25


Hint 112

hints

Hint for Invoice 3

-20


Hint 106

hints

Hint for Invoice 2

-20


Hint 104

hints

Hint for Invoice 1

-15


Hint 22

hints

Hint for HTTP Interpretation 3

-5


Hint 20

hints

Hint for HTTP Interpretation 2

-5


Hint 17

hints

Hint for HTTP Interpretation 1

-5


Hint 1

hints

Hint for DNS Concepts 2

-5


Hint 4

hints

Hint for DNS Concepts 1

-2


Hint 3

hints

Hint for DNS Concepts 1

-1


Solves

Challenge Category Value Time
DNS Concepts 1 DNS 5
DNS Concepts 2 DNS 5
DNS Concepts 3 DNS 5
DNS Concepts 4 DNS 15
DNS Concepts 5 DNS 15
HTTP Interpretation 1 HTTP 5
HTTP Interpretation 2 HTTP 5
HTTP Interpretation 3 HTTP 5
HTTP Logs 1.1 HTTP 10
HTTP Logs 1.2 HTTP 15
HTTP Logs 1.4 HTTP 20
HTTP Logs 1.3 HTTP 20
HTTP Logs 1.5 HTTP 25
HTTP Logs 1.6 HTTP 25
HTTP Phishing 1 HTTP 25
HTTP Phishing 2 HTTP 25
HTTP Phishing 3 HTTP 25
HTTP Phishing 4 HTTP 25
HTTP Phishing 5 HTTP 25
HTTP Phishing 6 HTTP 25
HTTP Phishing 7 HTTP 20
HTTP Phishing 8 HTTP 25
DNS Logs 1 DNS 20
DNS Logs 2 DNS 20
External DNS DNS 25
Doppelgänger DNS 25
TLS 1.3 HTTPS 15
Let's Encrypt! HTTPS 20
IDS meets encryption HTTPS 20
How much data? HTTPS 25
A Virus You Say? Host Events 20
USB Device Host Events 20
What is it? Host Events 20
File Sharing is Caring Host Events 25
Let me in! Host Events 25
Email Analysis 1.1 SMTP 5
Email Analysis 1.2 SMTP 10
Email Analysis 1.3 SMTP 10
Email Analysis 1.4 SMTP 10
Email Analysis 1.5 SMTP 15
Email Analysis 1.6 SMTP 15
Email Analysis 1.7 SMTP 15
Love Letter 1 Suspicious Files 1 15
Love Letter 2 Suspicious Files 1 20
Love Letter 3 Suspicious Files 1 20
Love Letter 4 Suspicious Files 1 20
Secure Document 1 Suspicious Files 2 15
Secure Document 2 Suspicious Files 2 20
Secure Document 3 Suspicious Files 2 25
Secure Document 4 Suspicious Files 2 25
Invoice 1 Suspicious Files 3 15
Invoice 2 Suspicious Files 3 20
Invoice 3 Suspicious Files 3 20
Invoice 4 Suspicious Files 3 20
Invoice 5 Suspicious Files 3 25
Email Analysis 2.1 SMTP 2 10
Email Analysis 2.2 SMTP 2 10
Email Analysis 2.3 SMTP 2 10
Email Analysis 2.4 SMTP 2 15
Email Analysis 2.6 SMTP 2 20
Email Analysis 2.7 SMTP 2 25
Email Analysis 2.8 SMTP 2 25
Rogue Device Protocol Grab Bag 20
SSH Outbound Protocol Grab Bag 20
An Attempt Was Made... Protocol Grab Bag 25
Remote Administration Protocol Grab Bag 25