🎃 Spooky SSC CTF 🎃

🔍 Discover

After finding the haunted scorecard, discover the highest-scoring CVE and identify the threat actors who have exploited similar vulnerabilities!

Your Mission: After finding the haunted scorecard, discover the highest-scoring CVE and identify the threat actors who have exploited similar vulnerabilities!

💡 Challenge Overview

Goal: Find the highest-scoring CVE and research the threat group that exploits it.

Difficulty: Threat Intelligence - Real-world threat research!

Time to complete: 20-40 minutes

Key Learning: CVE analysis and threat actor research!

🎯 Discovery Mission

Now that you've found the haunted scorecard, it's time to dig deeper into the threat intelligence. You need to find the highest-scoring CVE and research the threat actors who exploit these vulnerabilities.

🔍 CVE Research Instructions

Navigate back to the scorecard in SecurityScorecard and look for:

👻 Threat Actor Research

Research the threat group that exploits these vulnerabilities to understand:

🔍 Research Tools & Sources

Use these resources to complete your threat intelligence research:

🎯 What You're Learning

💡 Pro Tips

🏁 Submit Your Findings

Enter your research findings: