isrt

2nd place

1210 points


Members

User Name Score
ivsar 1210

Solves

Challenge Category Value Time
Secure Document 1 Suspicious Files 2 15
TLS 1.3 HTTPS 15
HTTP Interpretation 1 HTTP 5
Invoice 1 Suspicious Files 3 15
Rogue Device Protocol Grab Bag 20
A Virus You Say? Host Events 20
Email Analysis 2.1 SMTP 2 10
DNS Concepts 1 DNS 5
Love Letter 1 Suspicious Files 1 15
Email Analysis 1.1 SMTP 5
Secure Document 2 Suspicious Files 2 20
Let's Encrypt! HTTPS 20
HTTP Interpretation 2 HTTP 5
Invoice 2 Suspicious Files 3 20
SSH Outbound Protocol Grab Bag 20
USB Device Host Events 20
Email Analysis 2.2 SMTP 2 10
DNS Concepts 2 DNS 5
Love Letter 2 Suspicious Files 1 20
Email Analysis 1.2 SMTP 10
Secure Document 3 Suspicious Files 2 25
IDS meets encryption HTTPS 20
HTTP Interpretation 3 HTTP 5
Invoice 3 Suspicious Files 3 20
An Attempt Was Made... Protocol Grab Bag 25
What is it? Host Events 20
Email Analysis 2.3 SMTP 2 10
DNS Concepts 3 DNS 5
Love Letter 3 Suspicious Files 1 20
Email Analysis 1.3 SMTP 10
Secure Document 4 Suspicious Files 2 25
How much data? HTTPS 25
HTTP Logs 1.1 HTTP 10
Invoice 4 Suspicious Files 3 20
Remote Administration Protocol Grab Bag 25
File Sharing is Caring Host Events 25
Email Analysis 2.4 SMTP 2 15
DNS Concepts 4 DNS 15
Love Letter 4 Suspicious Files 1 20
Email Analysis 1.4 SMTP 10
HTTP Logs 1.2 HTTP 15
Invoice 5 Suspicious Files 3 25
Let me in! Host Events 25
Email Analysis 2.5 SMTP 2 15
DNS Concepts 5 DNS 15
Email Analysis 1.6 SMTP 15
Email Analysis 1.7 SMTP 15
Email Analysis 1.5 SMTP 15
Email Analysis 2.6 SMTP 2 20
Email Analysis 2.7 SMTP 2 25
Email Analysis 2.8 SMTP 2 25
DNS Logs 1 DNS 20
DNS Logs 2 DNS 20
External DNS DNS 25
Doppelgänger DNS 25
HTTP Logs 1.3 HTTP 20
HTTP Logs 1.4 HTTP 20
HTTP Logs 1.5 HTTP 25
HTTP Logs 1.6 HTTP 25
HTTP Phishing 1 HTTP 25
HTTP Phishing 2 HTTP 25
HTTP Phishing 3 HTTP 25
HTTP Phishing 4 HTTP 25
HTTP Phishing 5 HTTP 25
HTTP Phishing 6 HTTP 25
HTTP Phishing 7 HTTP 20
HTTP Phishing 8 HTTP 25