

adasumizox
Identity Guardian
80 / 22766 XP to level 58
*Rankings computed based on core modules (78480 pts).
Joined in January, 2024
adasumizox earned 8 badges
Download Your Certificate!
You've completed games and earned badges! Click on any badge below to view and download your certificate!

Valdorian Times
This analyst investigated an email phishing attack in Valdoria that uncovered a politically motivated influence campaign. Using Kusto Query Language (KQL), they analyzed employee roles, email communications, and computer process events, revealing evidence of data exfiltration and manipulation. This exercise reinforced skill in querying data and understanding data integrity within a cybersecurity context.
Issued on: Jan 27, 2024

Balloons Over Iowa
This analyst completed the "Balloons Over Iowa" module, investigating a phishing and ransomware attack. They identified command and control connections, detected data exfiltration, analyzed Mimikatz activity, and observed shadow copy deletions, demonstrating their ability to effectively respond to and analyze cyber threats.
Issued on: Jan 28, 2024

Krusty Krab
This analyst completed the "Krusty Krab" module, investigating a phishing attack and data exfiltration. They used Kusto Query Language (KQL) to analyze email and network logs, revealing the use of deceptive email addresses and malicious domains. This exercise emphasized their ability to pivot and connect malicious domains to threat actor behavior, showcasing their proficiency in threat detection and analysis.
Issued on: Feb 01, 2024

Envolve Labs
This analyst completed the "Envolve Labs" module. They demonstrated skills in using Kusto Query Language (KQL) in their investigation that included identifying phishing campaigns, analyzing command-line activities, and uncovering credential theft and data exfiltration. They also learned to cluster and attribute attacks to specific threat actors, connecting malicious domains and email addresses to threat actor behavior.
Issued on: Feb 02, 2024

Castle & Sand
This analyst investigated an easy-level ransomware scenario by identifying adversaries' reconnaissance activities, analyzing themed phishing emails, and tracking ransomware deployment and impact. They used the Kusto Query Language (KQL) to analyze intrusion data and build an understanding of the ransomware attack lifecycle.
Issued on: Feb 02, 2024

Dai Wok Foods
This analyst completed the "Dai Wok Foods" module. They demonstrated skills in detecting phishing attempts, analyzing email logs, and using Passive DNS for domain analysis. This proficiency is vital for countering threat actor tactics and protecting organizational assets.
Issued on: Feb 04, 2024

World Domination Nation
This analyst completed the "World Domination Nation" module, investigating a sophisticated cyber attack on WDN Consulting. They used Kusto Query Language (KQL) in an investigation that covered lateral movement, credential dumping, system configuration modifications, and full domain compromise. This exercise reinforced their ability to effectively detect, analyze, and respond to complex cyber threats.
Issued on: Feb 05, 2024

Scholomance
This analyst completed the "Scholomance" module, which focused on threat hunting with a threat intelligence-driven investigation. Using Kusto Query Language (KQL), they reinforced their skills in threat detection, anomaly identification, and data correlation.
Issued on: Feb 10, 2024
adasumizox played 14 games
Level 1: A Scandal in Valdoria 2430/2430
Level 2: Envolve Labs: With a twist! 950/950
Level 2: HopsNStuff 14265/14265
Level 2: KRUSTY KRAB 7360/7360
Level 2: Castle & Sand 13050/13050
Level 3: Balloons Over Iowa 4405/4405
Level 3: Dai Wok Foods 11600/11600
Level 3: DAILY7 🌎 70/7066
Level 3: Scholomance 5640/5640
Level 3: A Storm Is Brewing In the Lab 0/5670
Level 4: World Domination Nation 8220/8220
Level 4: Sunlands 6100/8437
Level 4: Spooky Sweets 3940/7640
Level 5: MCJ Walker 450/15265
Pattern of Life
Issue Badge to adasumizox
| # | Image | Badge | Description | Action |
|---|---|---|---|---|
| 1 | ![]() | Advanced Persistent Analyst | Someone who failed, got up, and tried again! | |
| 2 | ![]() | Helping Hand | This award is community-nominated! Someone in the KC7 community has recognized this user for their contributions to others! | |
| 3 | ![]() | Notre Dame Challenge | Completed the cybersecurity challenge event at Notre Dame in June 2023 | |
| 4 | ![]() | KC7 Top 10 (2023) | Awarded to top 10 KC7 players in 2023 | |
| 5 | ![]() | Cyber Challenge Series: Team Winner | This badge is issued to KC7 players who were members of a team that placed top 3 in a Blue Team Cyber Challenge event! | |
| 6 | ![]() | Super Fan | This badge is issued to any KC7 player who has completed 3 modules or more! | |
| 7 | ![]() | Most Improved | Someone who really improved over the course of a KC7 event! | |
| 8 | ![]() | Cyber Challenge Series: Winner | This badge is issued to KC7 players who placed top 3 (as an individual) in an Blue Team Cyber Challenge event! | |
| 9 | ![]() | 30 day hot steak | Awarded to a user who has answered a question for 30 days in a row. | |
| 10 | ![]() | 90 day streak | Awarded to a user who has answered a question for 90 days in a row. | |
| 11 | ![]() | Inside Encryptodera - Event Participant | Participant in the February 2024 monthly event featuring the Encryptodera module | |
| 12 | ![]() | The Teacher | Someone who really helped lift up their peers and enabled others to learn! | |
| 13 | ![]() | Bright Future | Someone who shows a lot of potential as a future cyber analyst! | |
| 14 | ![]() | Azure Crest | This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context. | |
| 15 | ![]() | 2024 SANS New2Cyber CTF Participant | This badge has been awarded to those who took part in the 2024 SANS New2Cyber x KC7 Capture The Flag (CTF) challenge, which involved investigating a ransomware attack on a hospital. | |
| 16 | ![]() | 60 day streak | Awarded to a user who has answered a question for 60 days in a row. | |
| 17 | ![]() | 120 day streak | Awarded to a user who has answered a question for 120 days in a row! | |
| 18 | ![]() | Intro Master | ||
| 19 | ![]() | Wiccon25 | You've participated to the WICCON25 workshop! You've successfully uncovered the full attack chain of a zombie themed ransomware. |

.png)

















