| # | Student | Country | Points |
|---|---|---|---|
| 1 | YDajdaj |
|
5,998 |
| 2 | SSalas |
|
5,998 |
| 3 | APosadas |
|
5,998 |
| 4 | MBarri |
|
5,998 |
| 5 | ELanda |
|
5,998 |
| 6 | JGutierrez |
|
5,668 |
| 7 | TTuma |
|
4,215 |
| 8 | HCherifi |
|
2,203 |
| 9 | ESmajlovic |
|
1,380 |
| 10 | FShiniti |
|
1,332 |
| 11 | MHernáez |
|
836 |
| 12 | CSaldaña |
|
569 |
| 13 | TSuarez |
|
519 |
| 14 | EPlatero |
|
429 |
| 15 | FRomero |
|
160 |
| 16 | VHegde |
|
160 |
| 17 | NScherger |
|
40 |
| 18 | CLimina |
|
40 |
| 19 | SWaymen |
|
40 |
| 20 | BSabanilla |
|
40 |
| 21 | MMachac |
|
30 |
| 22 | ASzymanowska |
|
20 |
| 23 | BCumi |
|
20 |
| 24 | HChitkara |
|
10 |
| 25 | MMustafa |
|
10 |
| 26 | JRestrepo |
|
10 |
| 27 | MMayer |
|
0 |
| 28 | ERodríguez |
|
0 |
| 29 | JOlds |
|
0 |
| 30 | CParra |
|
0 |
| 31 | GSingh |
|
0 |
| 32 | SKesarwani |
|
0 |
| 33 | RSrinivasan |
|
0 |
| 34 | RAvinash |
|
0 |
| 35 | KShreeya |
|
0 |
| Module 0: Windows Binaries | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Compiling & Building Executables | 10 | 100% | APosadas YDajdaj ESmajlovic |
| Class 2 (Brief): Windows Executables Format | 10 | 84% | APosadas YDajdaj ESmajlovic |
| Class 3 (Brief): Windows Loader | 10 | 77% | APosadas YDajdaj ESmajlovic |
| Class 4 (Brief): .NET Assemblies | 10 | 74% | APosadas YDajdaj ESmajlovic |
| Class 5 (Lab): Windows Binaries Example | 10 | 58% | APosadas YDajdaj ESmajlovic |
| Module 1: Dynamic Analysis | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Malicious Software 101 | 20 | 55% | APosadas YDajdaj ESmajlovic |
| Class 2 (Brief): Analysis Lab & Tools | 20 | 55% | APosadas YDajdaj ESmajlovic |
| Class 3 (Lab): Sandbox Analysis | 20 | 55% | APosadas YDajdaj ESmajlovic |
| Class 4 (Lab): Analysis Inside a Virtual Machine | 20 | 55% | APosadas YDajdaj ESmajlovic |
| Class 5 (Brief): Process and Network Monitoring | 30 | 55% | APosadas YDajdaj ESmajlovic |
| Module 2: Tools Arsenal | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): PE Editors & Process Explorer | 30 | 48% | APosadas YDajdaj ESmajlovic |
| Class 2 (Brief): WinDbg, IDA Pro & Qilinq | 30 | 48% | APosadas YDajdaj ESmajlovic |
| Class 3 (Chall): PE Editors Exercise | 30 | 48% | APosadas YDajdaj ESmajlovic |
| Class 4 (Lab): Debuggers & Disassemblers | 40 | 42% | APosadas YDajdaj ESmajlovic |
| Class 4.1 (Chall): Debuggers & Disassemblers | 41 | 45% | APosadas YDajdaj ESmajlovic |
| Class 5 (Lab): Wireshark 101 | 46 | 48% | APosadas YDajdaj TTuma |
| Class 5.1 (Lab): Fakenet 101 | 46 | 48% | APosadas YDajdaj TTuma |
| Class 5.2 (Lab): Inetsim 101 | 46 | 45% | APosadas TTuma YDajdaj |
| Module 4: Packers & Obfuscators | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Carnita Methodology | 50 | 39% | APosadas YDajdaj ESmajlovic |
| Class 2 (Brief):Unpacking & Deobfuscation Strategy | 50 | 35% | APosadas YDajdaj ESmajlovic |
| Class 3 (Lab): Unpacking UPX | 55 | 29% | APosadas YDajdaj TTuma |
| Class 3.1 (Lab): Unpacking UPX | 55 | 29% | APosadas YDajdaj TTuma |
| Class 4 (Lab): Unpacking ASPack | 56 | 29% | APosadas YDajdaj TTuma |
| Class 4.1 (Lab): Unpacking ASPack | 56 | 29% | APosadas YDajdaj TTuma |
| Class 4.2 (Lab): Unpacking ASPack | 57 | 29% | APosadas YDajdaj TTuma |
| Class 5 (Chall): Unpacking UPX your way | 65 | 26% | APosadas YDajdaj TTuma |
| Class 6 (Chall): Unpacking for Flag | 75 | 26% | APosadas YDajdaj SSalas |
| Module 5: Aniti-Malware Tricks | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Brief): Anti-Debugging | 68 | 29% | APosadas YDajdaj ESmajlovic |
| Class 2 (Brief): Anti-VM and Packers | 69 | 29% | APosadas YDajdaj ESmajlovic |
| Class 3 (Brief): Process Injection | 70 | 29% | APosadas YDajdaj ESmajlovic |
| Class 4 (Lab): Anti-Debugging Ticks | 71 | 26% | APosadas YDajdaj SSalas |
| Class 4.1 (Chall): Patch the Binary | 75 | 26% | APosadas YDajdaj SSalas |
| Class 4.2 (Chall): Find the Offset | 76 | 26% | APosadas YDajdaj SSalas |
| Class 5 (Lab): Anti-Malware Ticks | 78 | 26% | APosadas YDajdaj SSalas |
| Module 6: Process Injection | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Lab): CreateRemoteThread Technique | 75 | 26% | APosadas YDajdaj SSalas |
| Class 2 (Lab): SetThreadContext Technique | 75 | 26% | APosadas YDajdaj SSalas |
| Class 2.1 (Lab): SetThreadContext Technique | 75 | 29% | APosadas YDajdaj SSalas |
| Class 3 (Chall): Find the Window | 80 | 26% | YDajdaj APosadas SSalas |
| Class 3.1 (Lab): Fighting Process Injection with x32dbg | 85 | 23% | APosadas YDajdaj SSalas |
| Class 4 (Chall): Find the Shellcode | 95 | 26% | YDajdaj APosadas JGutierrez |
| Class 5 (Chall): Intercept the Shellcode | 100 | 26% | APosadas YDajdaj JGutierrez |
| Module 8: Dissecting Infostealers like a BOSS | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Lab): Scripts 101 | 90 | 19% | APosadas YDajdaj JGutierrez |
| Class 2 (Lab): Dissecting BAT Downloader | 90 | 19% | APosadas YDajdaj JGutierrez |
| Class 3 (Lab): Dissecting Powershell Dropper with NeZa | 90 | 19% | YDajdaj APosadas JGutierrez |
| Class 3.1 (Lab): Dissecting Powershell Dropper | 90 | 19% | YDajdaj APosadas JGutierrez |
| Class 4 (Lab): Dissecting JavaScript Chrome Extension | 91 | 19% | YDajdaj APosadas JGutierrez |
| Class 4.1 (Lab): Dissecting JavaScript Chrome Extension | 91 | 19% | YDajdaj APosadas JGutierrez |
| Class 4.2 (Lab): Dissecting JavaScript Chrome Extension | 91 | 19% | YDajdaj APosadas JGutierrez |
| Class 5 (Chall): Dissecting Infostealer | 120 | 19% | APosadas YDajdaj JGutierrez |
| Class 5.1 (Chall): Dissecting the Plugin | 150 | 19% | APosadas YDajdaj JGutierrez |
| Module 9: Fighting Ransomware | Points | Solved by | First solvers |
|---|---|---|---|
| Class 1 (Lab): Intercepting RSA key with NeZa | 100 | 19% | APosadas YDajdaj JGutierrez |
| Class 2 (Lab): Intercepting AES key with NeZa | 100 | 19% | APosadas YDajdaj JGutierrez |
| Class 3 (Lab): Unhooking a locked machine with NeZa | 110 | 19% | APosadas YDajdaj JGutierrez |
| Class 4 (Lab): Reversing Ryuk Ransomware with IDA | 120 | 19% | APosadas YDajdaj JGutierrez |
| Class 4.1 (Lab): Recovering Ryuk Files with NeZa | 120 | 19% | APosadas YDajdaj JGutierrez |
| Class 5 (Chall): Restoring Locked Keyboard | 130 | 16% | APosadas YDajdaj SSalas |
| Class 6 (Chall): Recovering Encrypted Machine | 200 | 16% | YDajdaj SSalas APosadas |