Lone_Wolf

13th place

730 points


Members

User Name Score
peteralm 730

Awards


Hint 99

hints

Hint for Secure Document 2

-10


Hint 124

hints

Hint for Secure Document 4

-10


Hint 125

hints

Hint for Secure Document 4

-20


Hint 119

hints

Hint for Let's Encrypt!

-10


Hint 29

hints

Hint for HTTP Logs 1.3

-5


Hint 30

hints

Hint for HTTP Logs 1.3

-10


Hint 31

hints

Hint for HTTP Logs 1.3

-20


Hint 47

hints

Hint for HTTP Phishing 7

-10


Hint 46

hints

Hint for HTTP Phishing 7

-20


Hint 38

hints

Hint for HTTP Phishing 2

-10


Hint 39

hints

Hint for HTTP Phishing 2

-25


Hint 44

hints

Hint for HTTP Phishing 5

-25


Hint 45

hints

Hint for HTTP Phishing 6

-25


Hint 111

hints

Hint for Invoice 3

-5


Hint 112

hints

Hint for Invoice 3

-20


Hint 109

hints

Hint for Invoice 4

-10


Hint 110

hints

Hint for Invoice 4

-20


Hint 74

hints

Hint for Rogue Device

-20


Hint 89

hints

Hint for Remote Administration

-10


Hint 90

hints

Hint for Remote Administration

-25


Hint 83

hints

Hint for File Sharing is Caring

-10


Hint 85

hints

Hint for Let me in!

-5


Hint 86

hints

Hint for Let me in!

-25


Hint 70

hints

Hint for Email Analysis 2.7

-15


Hint 71

hints

Hint for Email Analysis 2.7

-25


Hint 12

hints

Hint for External DNS

-10


Hint 94

hints

Hint for Love Letter 3

-20


Hint 54

hints

Hint for Email Analysis 1.6

-5


Hint 55

hints

Hint for Email Analysis 1.6

-15


Solves

Challenge Category Value Time
Secure Document 1 Suspicious Files 2 15
Secure Document 2 Suspicious Files 2 20
Secure Document 3 Suspicious Files 2 25
Secure Document 4 Suspicious Files 2 25
TLS 1.3 HTTPS 15
Let's Encrypt! HTTPS 20
IDS meets encryption HTTPS 20
How much data? HTTPS 25
HTTP Interpretation 1 HTTP 5
HTTP Interpretation 2 HTTP 5
HTTP Interpretation 3 HTTP 5
HTTP Logs 1.1 HTTP 10
HTTP Logs 1.2 HTTP 15
HTTP Logs 1.4 HTTP 20
HTTP Logs 1.3 HTTP 20
HTTP Phishing 7 HTTP 20
HTTP Logs 1.5 HTTP 25
HTTP Logs 1.6 HTTP 25
HTTP Phishing 1 HTTP 25
HTTP Phishing 2 HTTP 25
HTTP Phishing 3 HTTP 25
HTTP Phishing 4 HTTP 25
HTTP Phishing 5 HTTP 25
HTTP Phishing 6 HTTP 25
HTTP Phishing 8 HTTP 25
Invoice 1 Suspicious Files 3 15
Invoice 2 Suspicious Files 3 20
Invoice 3 Suspicious Files 3 20
Invoice 5 Suspicious Files 3 25
Invoice 4 Suspicious Files 3 20
Rogue Device Protocol Grab Bag 20
SSH Outbound Protocol Grab Bag 20
An Attempt Was Made... Protocol Grab Bag 25
Remote Administration Protocol Grab Bag 25
A Virus You Say? Host Events 20
USB Device Host Events 20
What is it? Host Events 20
File Sharing is Caring Host Events 25
Email Analysis 2.1 SMTP 2 10
Email Analysis 2.2 SMTP 2 10
Email Analysis 2.3 SMTP 2 10
Email Analysis 2.4 SMTP 2 15
Email Analysis 2.5 SMTP 2 15
Email Analysis 2.6 SMTP 2 20
Email Analysis 2.8 SMTP 2 25
DNS Concepts 1 DNS 5
DNS Concepts 2 DNS 5
DNS Concepts 3 DNS 5
DNS Concepts 4 DNS 15
DNS Concepts 5 DNS 15
DNS Logs 1 DNS 20
DNS Logs 2 DNS 20
External DNS DNS 25
Doppelgänger DNS 25
Love Letter 1 Suspicious Files 1 15
Love Letter 2 Suspicious Files 1 20
Love Letter 3 Suspicious Files 1 20
Love Letter 4 Suspicious Files 1 20
Email Analysis 1.1 SMTP 5
Email Analysis 1.2 SMTP 10
Email Analysis 1.3 SMTP 10
Email Analysis 1.4 SMTP 10
Email Analysis 1.7 SMTP 15
Email Analysis 1.5 SMTP 15
Let me in! Host Events 25