
Zedd
Cybernetic Strategist
Level 82 165504 / 197214
*Rankings computed based on core modules (89417 pts).
Joined in October, 2023
Zedd earned 12 badges

Spooky Sweets
This analyst completed the "Spooky Sweets" module, investigating the staging and compressing of files for exfiltration of intellectual property. Skills gained include identifying early indicators, mitigating damage, and enhancing detection. This exercise highlighted their ability to respond to sophisticated cyber intrusions by leveraging knowledge of attacker behavior and TTPs.
Issued on: Oct 28, 2023

Jojo's Hospital
This analyst completed the JoJo's Hospital module, investigating a cyber attack involving an Initial Access Broker and a Ransomware-as-a-Service (RaaS) operation. They demonstrated skills in detecting phishing and malvertising tactics, tracing unauthorized network access, understanding hacker collaboration, and analyzing ransomware activities.
Issued on: Jan 17, 2025

Valdorian Times
This analyst investigated an email phishing attack in Valdoria that uncovered a politically motivated influence campaign. Using Kusto Query Language (KQL), they analyzed employee roles, email communications, and computer process events, revealing evidence of data exfiltration and manipulation. This exercise reinforced skill in querying data and understanding data integrity within a cybersecurity context.
Issued on: Jan 17, 2025

Dai Wok Foods
This analyst completed the "Dai Wok Foods" module. They demonstrated skills in detecting phishing attempts, analyzing email logs, and using Passive DNS for domain analysis. This proficiency is vital for countering threat actor tactics and protecting organizational assets.
Issued on: Feb 27, 2025

Castle & Sand
This analyst investigated an easy-level ransomware scenario by identifying adversaries' reconnaissance activities, analyzing themed phishing emails, and tracking ransomware deployment and impact. They used the Kusto Query Language (KQL) to analyze intrusion data and build an understanding of the ransomware attack lifecycle.
Issued on: Feb 17, 2025

Virustotal Fundamentals
This analyst completed the "VirusTotal Fundamentals" module, which focused on using VirusTotal for comprehensive threat analysis. They demonstrated the ability to pivot around datasets, utilizing file hashes, domains, and IP addresses to uncover and correlate threats. This exercise reinforced their skills in leveraging VirusTotal's capabilities for detecting malicious activity and understanding the interconnections between various threat indicators.
Issued on: Feb 09, 2025

Frognado In Valdoria
This analyst successfully investigated a hacktivist intrusion on FramtidX system. Through their use of Kusto Query Language (KQL), they discovered how the intruders managed to deface the companyβs website and internal documents. They followed the activities of the threat actor, from reconnaissance to exfiltration, and uncovered the use of an internal account to further their compromise.
Issued on: Feb 15, 2025

Sunlands βοΈππ§βπ
This analyst investigated a sophisticated cyber attack on the Sunlands Aeronautics and Space Administration (SASA). They demonstrated advanced skills in detecting phishing attacks, analyzing malicious file downloads, and uncovering command and control infrastructure and persistence mechanisms. This exercise showcased their ability to respond to advanced cyber threats using threat actor tactics, techniques, and procedures (TTPs).
Issued on: Feb 27, 2025
.png)
Solvi Systems
This analyst investigated a cybersecurity incident at Solvi Systems by identifying an attempted XSS attack and tracking a phishing email campaign. Using Kusto Query Language (KQL), they uncovered the threat actorβs reconnaissance efforts, system compromises, and malware activities, providing critical insights for enhancing security measures.
Issued on: Feb 27, 2025

Inside Encryptodera
This analyst investigated an easy-level insider threat scenario by identifying suspicious employee activities, analyzing internal communications, and tracking unauthorized data transfers. They used Kusto Query Language (KQL) to analyze network flows and identify abnormal data movement to build and insider-threat profile.
Issued on: Feb 28, 2025

Rap Beef
This analyst investigated a themed scenario involving rival hip-hop artists. They used key cybersecurity skills to identify suspicious communications and activities, analyzing internal messages to track unauthorized exchanges and uncover patterns. This exercise reinforced critical skills in data analysis, threat detection, and the application of cybersecurity principles in unconventional contexts.
Issued on: Mar 06, 2025

World Domination Nation
This analyst completed the "World Domination Nation" module, investigating a sophisticated cyber attack on WDN Consulting. They used Kusto Query Language (KQL) in an investigation that covered lateral movement, credential dumping, system configuration modifications, and full domain compromise. This exercise reinforced their ability to effectively detect, analyze, and respond to complex cyber threats.
Issued on: Mar 09, 2025
Zedd played 30 games
HopsNStuff 5010/14265
Dai Wok Foods 11600/11600
Castle & Sand 13050/13050
World Domination Nation 8220/8220
MCJ Walker 450/15265
Sunlands 8437/8437
Spooky Sweets 7640/7640
A Scandal in Valdoria π 2430/2430
Inside Encryptodera 3990/3990
Solvi Systems 2860/2860
A Rap Beef (START HERE) 950/950
Private Module 950/950
Jojo's Hospital 610/610
VirusTotal Fundamentals 2620/2620
Frognado in Valdoria 1690/1690
A Rap Steak 19010/19010
Valdoria Votes 850/2750
Private Module 2430/2430
Private Module 610/610
Private Module 2860/2860
Private Module 1690/1690
Private Module 3990/3990
Private Module 13050/13050
Private Module 2620/2620
Private Module 7640/7640
Private Module 11600/11600
Private Module 8437/8437
Private Module 19010/19010
Private Module 420/2430
Private Module 790/950
Pattern of Life
Issue Badge to Zedd
# | Image | Badge | Description | Action |
---|---|---|---|---|
1 | ![]() | Advanced Persistent Analyst | Someone who failed, got up, and tried again! | |
2 | ![]() | Helping Hand | This award is community-nominated! Someone in the KC7 community has recognized this user for their contributions to others! | |
3 | ![]() | Notre Dame Challenge | Completed the cybersecurity challenge event at Notre Dame in June 2023 | |
4 | ![]() | KC7 Top 10 (2023) | Awarded to top 10 KC7 players in 2023 | |
5 | ![]() | Cyber Challenge Series: Team Winner | This badge is issued to KC7 players who were members of a team that placed top 3 in a Blue Team Cyber Challenge event! | |
6 | ![]() | Super Fan | This badge is issued to any KC7 player who has completed 3 modules or more! | |
7 | ![]() | Most Improved | Someone who really improved over the course of a KC7 event! | |
8 | ![]() | Cyber Challenge Series: Winner | This badge is issued to KC7 players who placed top 3 (as an individual) in an Blue Team Cyber Challenge event! | |
9 | ![]() | 30 day hot steak | Awarded to a user who has answered a question for 30 days in a row. | |
10 | ![]() | 90 day streak | Awarded to a user who has answered a question for 90 days in a row. | |
11 | ![]() | Inside Encryptodera - Event Participant | Participant in the February 2024 monthly event featuring the Encryptodera module | |
12 | ![]() | The Teacher | Someone who really helped lift up their peers and enabled others to learn! | |
13 | ![]() | Bright Future | Someone who shows a lot of potential as a future cyber analyst! | |
14 | ![]() | Azure Crest | This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context. | |
15 | ![]() | 2024 SANS New2Cyber CTF Participant | This badge has been awarded to those who took part in the 2024 SANS New2Cyber x KC7 Capture The Flag (CTF) challenge, which involved investigating a ransomware attack on a hospital. | |
16 | ![]() | 60 day streak | Awarded to a user who has answered a question for 60 days in a row. | |
17 | ![]() | 120 day streak | Awarded to a user who has answered a question for 120 days in a row! | |
18 | ![]() | Intro Master |