|
compromised - rootkit
|
incident response |
250 |
|
|
etacsufbo - huh
|
incident response |
100 |
|
|
etacsufbo
|
incident response |
200 |
|
|
compromised - initial access
|
incident response |
100 |
|
|
compromised - persistence
|
incident response |
100 |
|
|
compromised - privesc
|
incident response |
100 |
|
|
compromised - pivot
|
incident response |
100 |
|
|
compromised - reconnaisance
|
incident response |
100 |
|
|
etacsufbo - mini
|
incident response |
50 |
|
|
zanbil 6
|
detection - siem |
50 |
|
|
zanbil 1
|
detection - siem |
50 |
|
|
zanbil 4
|
detection - siem |
50 |
|
|
zanbil 3
|
detection - siem |
50 |
|
|
zanbil 2
|
detection - siem |
50 |
|
|
gone fishing
|
detection |
100 |
|
|
thats probably fine
|
detection |
100 |
|
|
wtf is that
|
detection |
100 |
|
|
enumeration
|
detection |
100 |
|
|
more mal where?
|
detection |
100 |
|
|
mal where?
|
detection |
50 |
|
|
bad access
|
detection |
50 |
|
|
grep
|
detection |
50 |
|
|
spyplane 5
|
detection - malware lab |
100 |
|
|
spyplane 4
|
detection - malware lab |
50 |
|
|
spyplane 3
|
detection - malware lab |
50 |
|
|
spyplane 1
|
detection - malware lab |
25 |
|
|
tripview
|
iOS |
50 |
|
|
friends
|
iOS |
50 |
|
|
device identification
|
iOS |
50 |
|
|
me
|
iOS |
50 |
|
|
calculator
|
iOS |
50 |
|
|
froot
|
android |
50 |
|
|
start here
|
networking |
0 |
|
|
broken discs
|
disk |
150 |
|
|
verification (2)
|
disk |
100 |
|
|
verification (1)
|
disk |
100 |
|
|
rm -rf
|
disk |
50 |
|
|
too many files
|
disk |
50 |
|
|
hidden in plain sight
|
methodology |
100 |
|
|
based
|
methodology |
100 |
|
|
deep
|
methodology |
100 |
|
|
jif
|
methodology |
50 |
|
|
dog
|
methodology |
50 |
|
|
'hacker'
|
methodology |
50 |
|