pwn4g3 All14nc3
8th place
180 points
Members
| User Name | Score |
| Kostinas | 110 |
| L3m0noStriftis | 40 |
| ph4ntom | 30 |
| V3in | 0 |
Solves
| Challenge | Category | Value | Time |
| What is the URL used to download the encryption configuration | Forensics | 30 | |
| What is the encryption key | Forensics | 20 | |
| What is the filename of the ransomware launched by the attackers | Forensics | 50 | |
| What is the MITRE ATT&CK ID of the technique | Forensics | 10 | |
| What algorithm is used to encrypt the files | Forensics | 20 | |
| Message Received | Mobile | 20 | |
| Find the flag inside the email | Forensics | 10 | |
| What is the email used by the adversaries | Forensics | 10 | |
| What is the email address of the victim | Forensics | 10 |