Wolf

Wolf🛡️Pacq

14th place

709 points


Awards


Hint 120

hints

Hint for IDS meets encryption

-5


Hint 121

hints

Hint for IDS meets encryption

-20


Hint 122

hints

Hint for How much data?

-10


Hint 123

hints

Hint for How much data?

-25


Hint 47

hints

Hint for HTTP Phishing 7

-10


Hint 38

hints

Hint for HTTP Phishing 2

-10


Hint 45

hints

Hint for HTTP Phishing 6

-25


Hint 46

hints

Hint for HTTP Phishing 7

-20


Hint 115

hints

Hint for HTTP Phishing 8

-15


Hint 116

hints

Hint for HTTP Phishing 8

-25


Hint 107

hints

Hint for Invoice 5

-10


Hint 79

hints

Hint for A Virus You Say?

-10


Hint 80

hints

Hint for A Virus You Say?

-20


Hint 87

hints

Hint for What is it?

-20


Hint 85

hints

Hint for Let me in!

-5


Hint 86

hints

Hint for Let me in!

-25


Hint 77

hints

Hint for An Attempt Was Made...

-15


Hint 78

hints

Hint for An Attempt Was Made...

-25


Hint 89

hints

Hint for Remote Administration

-10


Hint 90

hints

Hint for Remote Administration

-25


Hint 70

hints

Hint for Email Analysis 2.7

-15


Hint 71

hints

Hint for Email Analysis 2.7

-25


Hint 95

hints

Hint for Love Letter 3

-5


Hint 94

hints

Hint for Love Letter 3

-20


Hint 6

hints

Hint for DNS Concepts 2

-1


Hint 114

hints

Hint for DNS Concepts 5

-15


Hint 7

hints

Hint for DNS Logs 1

-5


Hint 12

hints

Hint for External DNS

-10


Hint 13

hints

Hint for External DNS

-25


Hint 18

hints

Hint for Doppelgänger

-10


Hint 15

hints

Hint for Doppelgänger

-25


Solves

Challenge Category Value Time
Secure Document 1 Suspicious Files 2 15
Secure Document 2 Suspicious Files 2 20
Secure Document 3 Suspicious Files 2 25
Secure Document 4 Suspicious Files 2 25
TLS 1.3 HTTPS 15
Let's Encrypt! HTTPS 20
IDS meets encryption HTTPS 20
HTTP Interpretation 1 HTTP 5
HTTP Interpretation 2 HTTP 5
HTTP Interpretation 3 HTTP 5
HTTP Logs 1.1 HTTP 10
HTTP Logs 1.2 HTTP 15
HTTP Logs 1.4 HTTP 20
HTTP Logs 1.3 HTTP 20
HTTP Logs 1.5 HTTP 25
HTTP Logs 1.6 HTTP 25
HTTP Phishing 1 HTTP 25
HTTP Phishing 2 HTTP 25
HTTP Phishing 3 HTTP 25
HTTP Phishing 4 HTTP 25
HTTP Phishing 5 HTTP 25
HTTP Phishing 6 HTTP 25
HTTP Phishing 7 HTTP 20
HTTP Phishing 8 HTTP 25
Invoice 1 Suspicious Files 3 15
Invoice 2 Suspicious Files 3 20
Invoice 3 Suspicious Files 3 20
Invoice 4 Suspicious Files 3 20
Invoice 5 Suspicious Files 3 25
A Virus You Say? Host Events 20
USB Device Host Events 20
What is it? Host Events 20
File Sharing is Caring Host Events 25
Rogue Device Protocol Grab Bag 20
SSH Outbound Protocol Grab Bag 20
An Attempt Was Made... Protocol Grab Bag 25
Remote Administration Protocol Grab Bag 25
Let me in! Host Events 25
Email Analysis 1.1 SMTP 5
Email Analysis 1.2 SMTP 10
Email Analysis 1.3 SMTP 10
Email Analysis 1.4 SMTP 10
Email Analysis 1.6 SMTP 15
Email Analysis 1.5 SMTP 15
Email Analysis 2.1 SMTP 2 10
Email Analysis 2.2 SMTP 2 10
Email Analysis 2.3 SMTP 2 10
Email Analysis 2.4 SMTP 2 15
Email Analysis 2.5 SMTP 2 15
Email Analysis 2.6 SMTP 2 20
Email Analysis 2.8 SMTP 2 25
Love Letter 1 Suspicious Files 1 15
Love Letter 2 Suspicious Files 1 20
Love Letter 4 Suspicious Files 1 20
DNS Concepts 1 DNS 5
DNS Concepts 3 DNS 5
DNS Concepts 4 DNS 15
DNS Concepts 5 DNS 15
DNS Logs 1 DNS 20
DNS Logs 2 DNS 20
External DNS DNS 25
Doppelgänger DNS 25
Love Letter 3 Suspicious Files 1 20
How much data? HTTPS 25
DNS Concepts 2 DNS 5
Email Analysis 2.7 SMTP 2 25