Michael

Michael

6th place

1070 points


Awards


Solves

Challenge Category Value Time
HTTP Interpretation 1 HTTP 5
HTTP Interpretation 2 HTTP 5
HTTP Interpretation 3 HTTP 5
SSH Outbound Protocol Grab Bag 20
Rogue Device Protocol Grab Bag 20
An Attempt Was Made... Protocol Grab Bag 25
DNS Concepts 1 DNS 5
DNS Concepts 2 DNS 5
DNS Concepts 4 DNS 15
DNS Concepts 5 DNS 15
HTTP Logs 1.1 HTTP 10
Email Analysis 1.1 SMTP 5
Email Analysis 1.2 SMTP 10
Secure Document 1 Suspicious Files 2 15
DNS Logs 1 DNS 20
DNS Logs 2 DNS 20
Love Letter 1 Suspicious Files 1 15
Love Letter 2 Suspicious Files 1 20
Love Letter 3 Suspicious Files 1 20
Love Letter 4 Suspicious Files 1 20
Secure Document 2 Suspicious Files 2 20
Secure Document 3 Suspicious Files 2 25
Email Analysis 1.3 SMTP 10
Email Analysis 1.4 SMTP 10
Email Analysis 1.7 SMTP 15
Email Analysis 1.5 SMTP 15
External DNS DNS 25
Secure Document 4 Suspicious Files 2 25
HTTP Logs 1.2 HTTP 15
HTTP Logs 1.3 HTTP 20
HTTP Logs 1.4 HTTP 20
HTTP Logs 1.5 HTTP 25
HTTP Logs 1.6 HTTP 25
HTTP Phishing 1 HTTP 25
HTTP Phishing 2 HTTP 25
HTTP Phishing 3 HTTP 25
HTTP Phishing 4 HTTP 25
HTTP Phishing 5 HTTP 25
HTTP Phishing 8 HTTP 25
TLS 1.3 HTTPS 15
Let's Encrypt! HTTPS 20
IDS meets encryption HTTPS 20
How much data? HTTPS 25
Invoice 1 Suspicious Files 3 15
Invoice 2 Suspicious Files 3 20
Invoice 3 Suspicious Files 3 20
Invoice 4 Suspicious Files 3 20
Invoice 5 Suspicious Files 3 25
Email Analysis 2.1 SMTP 2 10
Email Analysis 2.2 SMTP 2 10
Email Analysis 2.3 SMTP 2 10
Email Analysis 2.4 SMTP 2 15
Email Analysis 2.5 SMTP 2 15
Email Analysis 2.6 SMTP 2 20
Email Analysis 2.7 SMTP 2 25
Email Analysis 2.8 SMTP 2 25
USB Device Host Events 20
What is it? Host Events 20
File Sharing is Caring Host Events 25
A Virus You Say? Host Events 20