|
compromised - initial access
|
incident response |
100 |
|
|
compromised - privesc
|
incident response |
100 |
|
|
compromised - pivot
|
incident response |
100 |
|
|
compromised - reconnaisance
|
incident response |
100 |
|
|
zanbil 6
|
detection - siem |
50 |
|
|
zanbil 5
|
detection - siem |
50 |
|
|
zanbil 4
|
detection - siem |
50 |
|
|
zanbil 3
|
detection - siem |
50 |
|
|
zanbil 2
|
detection - siem |
50 |
|
|
zanbil 1
|
detection - siem |
50 |
|
|
gone fishing
|
detection |
100 |
|
|
thats probably fine
|
detection |
100 |
|
|
wtf is that
|
detection |
100 |
|
|
enumeration
|
detection |
100 |
|
|
more mal where?
|
detection |
100 |
|
|
mal where?
|
detection |
50 |
|
|
bad access
|
detection |
50 |
|
|
grep
|
detection |
50 |
|
|
etacsufbo - mini
|
incident response |
50 |
|
|
Map.
|
networking |
100 |
|
|
MAC In The Middle
|
networking |
100 |
|
|
Say cheese!
|
networking |
100 |
|
|
What is awesome?
|
networking |
50 |
|
|
Where is awesome?
|
networking |
50 |
|
|
Who is awesome?
|
networking |
50 |
|
|
Screenshare (1)
|
networking |
50 |
|
|
Old MACdonald
|
networking |
50 |
|
|
Digital Banker
|
networking |
50 |
|
|
Files (1)
|
networking |
50 |
|
|
start here
|
networking |
0 |
|
|
too many files
|
disk |
50 |
|
|
rm -rf
|
disk |
50 |
|
|
file encoder
|
methodology |
200 |
|
|
based
|
methodology |
100 |
|
|
deep
|
methodology |
100 |
|
|
jif
|
methodology |
50 |
|
|
'hacker'
|
methodology |
50 |
|
|
dog
|
methodology |
50 |
|