rpdeem01
Log Leprechaun
Level 21 148842 / 197214
*Rankings computed based on core modules (131700 pts).
Joined in August, 2024
rpdeem01 earned 18 badges
Rap Beef
This analyst investigated a themed scenario involving rival hip-hop artists. They used key cybersecurity skills to identify suspicious communications and activities, analyzing internal messages to track unauthorized exchanges and uncover patterns. This exercise reinforced critical skills in data analysis, threat detection, and the application of cybersecurity principles in unconventional contexts.
Issued on: Oct 28, 2024
Inside Encryptodera
This analyst investigated an easy-level insider threat scenario by identifying suspicious employee activities, analyzing internal communications, and tracking unauthorized data transfers. They used Kusto Query Language (KQL) to analyze network flows and identify abnormal data movement to build and insider-threat profile.
Issued on: Oct 30, 2024
Jojo's Hospital
This analyst completed the JoJo's Hospital module, investigating a cyber attack involving an Initial Access Broker and a Ransomware-as-a-Service (RaaS) operation. They demonstrated skills in detecting phishing and malvertising tactics, tracing unauthorized network access, understanding hacker collaboration, and analyzing ransomware activities.
Issued on: Oct 30, 2024
Valdorian Times
This analyst investigated an email phishing attack in Valdoria that uncovered a politically motivated influence campaign. Using Kusto Query Language (KQL), they analyzed employee roles, email communications, and computer process events, revealing evidence of data exfiltration and manipulation. This exercise reinforced skill in querying data and understanding data integrity within a cybersecurity context.
Issued on: Oct 30, 2024
Frognado In Valdoria
This analyst successfully investigated a hacktivist intrusion on FramtidX system. Through their use of Kusto Query Language (KQL), they discovered how the intruders managed to deface the company’s website and internal documents. They followed the activities of the threat actor, from reconnaissance to exfiltration, and uncovered the use of an internal account to further their compromise.
Issued on: Oct 31, 2024
Azure Crest
This analyst successfully investigated a ransomware attack against a hospital. They demonstrated the ability to pivot around datasets using Kusto Query Language (KQL) to uncover the risks associated with prioritizing cost over security. This exercise reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context.
Issued on: Nov 06, 2024
Titan Shield
This analyst successfully investigated two highly sophisticated cyberattacks against TitanShield’s sensitive projects, demonstrating advanced investigative skills in identifying social engineering tactics, malicious file execution, and data exfiltration strategies. Using Kusto Query Language (KQL), they unraveled Moonstone Sleet's phishing campaign targeting Project Omega and Crimson Sandstorm’s romance scheme aimed at harvesting critical system and user information. This exercise reinforced skills in threat actor profiling, recognizing social engineering-based reconnaissance on social media, and assessing the broader security implications of protecting intellectual property in a high-stakes defense context.
Issued on: Nov 06, 2024
AzureCrest
This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context.
Issued on: Nov 08, 2024
Virustotal Fundamentals
This analyst completed the "VirusTotal Fundamentals" module, which focused on using VirusTotal for comprehensive threat analysis. They demonstrated the ability to pivot around datasets, utilizing file hashes, domains, and IP addresses to uncover and correlate threats. This exercise reinforced their skills in leveraging VirusTotal's capabilities for detecting malicious activity and understanding the interconnections between various threat indicators.
Issued on: Nov 08, 2024
Solvi Systems
This analyst investigated a cybersecurity incident at Solvi Systems by identifying an attempted XSS attack and tracking a phishing email campaign. Using Kusto Query Language (KQL), they uncovered the threat actor’s reconnaissance efforts, system compromises, and malware activities, providing critical insights for enhancing security measures.
Issued on: Dec 24, 2024
Encryptodera @ Fairdale
Awarded for completing the Encryptodera module @ Fairdale
Issued on: Dec 28, 2024
Valdorian Times @ FHS
This badge is awarded to the analyst for completing the Valdorian Times module @ Fairdale. The analyst investigated an email phishing attack in Valdoria that uncovered a politically motivated influence campaign. Using Kusto Query Language (KQL), they analyzed employee roles, email communications, and computer process events, revealing evidence of data exfiltration and manipulation. This exercise reinforced skill in querying data and understanding data integrity within a cybersecurity context.
Issued on: Dec 28, 2024
Envolve Labs
This analyst completed the "Envolve Labs" module. They demonstrated skills in using Kusto Query Language (KQL) in their investigation that included identifying phishing campaigns, analyzing command-line activities, and uncovering credential theft and data exfiltration. They also learned to cluster and attribute attacks to specific threat actors, connecting malicious domains and email addresses to threat actor behavior.
Issued on: Nov 29, 2024
Krusty Krab
This analyst completed the "Krusty Krab" module, investigating a phishing attack and data exfiltration. They used Kusto Query Language (KQL) to analyze email and network logs, revealing the use of deceptive email addresses and malicious domains. This exercise emphasized their ability to pivot and connect malicious domains to threat actor behavior, showcasing their proficiency in threat detection and analysis.
Issued on: Dec 01, 2024
HHC2024
This analyst successfully investigated a complex series of challenges in the "The Great Elf Conflict" for the 2024 SANS Holiday Hack Challenge. Leveraging Kusto Queries to guide their investigation, demonstrating skills in leveraging advanced tools and integrating threat data to uncover and understand security threats.
Issued on: Dec 02, 2024
Celestial Cowboy Couture
This analyst completed the "Celestial Cowboy Couture" module, where they investigated a targeted phishing attack that resulted in data exfiltration and intellectual property theft. They demonstrated proficiency in using Kusto Query Language (KQL) to trace the attack, analyzing network traffic and credential misuse. The investigation involved connecting threat actor tactics, including the exploitation of an employee’s LinkedIn post to craft a convincing phishing email. By uncovering the full attack chain, the analyst successfully identified the real culprit and restored the company’s reputation.
Issued on: Dec 03, 2024
Balloons Over Iowa
This analyst completed the "Balloons Over Iowa" module, investigating a phishing and ransomware attack. They identified command and control connections, detected data exfiltration, analyzed Mimikatz activity, and observed shadow copy deletions, demonstrating their ability to effectively respond to and analyze cyber threats.
Issued on: Dec 03, 2024
World Domination Nation
This analyst completed the "World Domination Nation" module, investigating a sophisticated cyber attack on WDN Consulting. They used Kusto Query Language (KQL) in an investigation that covered lateral movement, credential dumping, system configuration modifications, and full domain compromise. This exercise reinforced their ability to effectively detect, analyze, and respond to complex cyber threats.
Issued on: Dec 23, 2024
rpdeem01 played 40 games
Balloons Over Iowa 4405/4405
Envolve Labs: With a twist! 950/950
HopsNStuff 9815/14265
KRUSTY KRAB 7360/7360
Dai Wok Foods 8335/11600
Castle & Sand 10200/13050
DAILY7 🌎🌟 630/4175
Private Module 0/0
World Domination Nation 8220/8220
MCJ Walker 9710/15265
Sunlands 3400/8437
Spooky Sweets 5040/7640
Scholomance 4390/5640
A Storm Is Brewing In the Lab 2970/5670
A Scandal in Valdoria 🌟 2430/2430
Private Module 2430/2430
Inside Encryptodera 3990/3990
Solvi Systems 2860/2860
Private Module 3990/3990
Private Module 6900/8770
AzureCrest - The full version 8790/8790
System Shutdown at Azure Crest! (Short Version) 4800/4800
A Rap Beef (START HERE) 950/950
Jojo's Hospital 610/610
VirusTotal Fundamentals 2620/2620
Titan Shield (with Microsoft Defender XDR) 4000/4000
Private Module 0/10920
Frognado in Valdoria 1690/1690
Private Module 950/950
Private Module 610/610
Private Module 350/350
A Rap Steak 7210/19010
Critical Compromise In Chicago - ICS 2310/2870
Private Module 2040/2040
Private Module 3990/3990
Valdoria Votes 2760/2750
Private Module 4157/7307
French Socksess Story 2100/2080
Turkey Bowl 900/2590
Private Module 0/1685
Issue Badge to rpdeem01
# | Image | Badge | Description | Action |
---|---|---|---|---|
1 | Advanced Persistent Analyst | Someone who failed, got up, and tried again! | ||
2 | Helping Hand | This award is community-nominated! Someone in the KC7 community has recognized this user for their contributions to others! | ||
3 | Notre Dame Challenge | Completed the cybersecurity challenge event at Notre Dame in June 2023 | ||
4 | KC7 Top 10 (2023) | Awarded to top 10 KC7 players in 2023 | ||
5 | Cyber Challenge Series: Team Winner | This badge is issued to KC7 players who were members of a team that placed top 3 in a Blue Team Cyber Challenge event! | ||
6 | Super Fan | This badge is issued to any KC7 player who has completed 3 modules or more! | ||
7 | Most Improved | Someone who really improved over the course of a KC7 event! | ||
8 | Cyber Challenge Series: Winner | This badge is issued to KC7 players who placed top 3 (as an individual) in an Blue Team Cyber Challenge event! | ||
9 | 30 day hot steak | Awarded to a user who has answered a question for 30 days in a row. | ||
10 | 90 day streak | Awarded to a user who has answered a question for 90 days in a row. | ||
11 | Inside Encryptodera - Event Participant | Participant in the February 2024 monthly event featuring the Encryptodera module | ||
12 | The Teacher | Someone who really helped lift up their peers and enabled others to learn! | ||
13 | Bright Future | Someone who shows a lot of potential as a future cyber analyst! | ||
14 | Azure Crest | This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context. | ||
15 | 2024 SANS New2Cyber CTF Participant | This badge has been awarded to those who took part in the 2024 SANS New2Cyber x KC7 Capture The Flag (CTF) challenge, which involved investigating a ransomware attack on a hospital. | ||
16 | 60 day streak | Awarded to a user who has answered a question for 60 days in a row. | ||
17 | 120 day streak | Awarded to a user who has answered a question for 120 days in a row! | ||
18 | Intro Master |