ATTACKER ######## [Game] Game started [Player] Total amount spent: 4.25 credit(s) [Inventory] Pentesting Suite I procured [Inventory] Port Scanner procured [Inventory] Vulnerability Scanner I procured [Action: Success] Infrastructure (untargeted): OSINT successfully played [Effect] OSINT triggers Insight Boost [Player] 9 turn(s) remaining [Game] Turn started: 2 ————————————————————————————————————————————————————————————————————— [Action: Success] LAN: Vulnerability Scan successfully played [Asset] LAN: Attack stage is now Initial Access [Effect] Vulnerability Scan triggers Insight Boost [Effect] Vulnerability Scan triggers Detect Vulnerability [Action: Success] Web Server: Vulnerability Scan successfully played [Asset] Web Server: Attack stage is now Initial Access [Effect] Vulnerability Scan triggers Insight Boost [Effect] Vulnerability Scan triggers Detect Vulnerability [Action: Success] Workstation I: Vulnerability Scan successfully played [Asset] Workstation I: Attack stage is now Initial Access [Effect] Vulnerability Scan triggers Insight Boost [Effect] Vulnerability Scan triggers Detect Vulnerability [Action: Success] Workstation II: Vulnerability Scan successfully played [Asset] Workstation II: Attack stage is now Initial Access [Effect] Vulnerability Scan triggers Insight Boost [Effect] Vulnerability Scan triggers Detect Vulnerability [Inventory] Generic Exploit acquired through Vulnerability Scan [Player] 8 turn(s) remaining [Game] Turn started: 3 ————————————————————————————————————————————————————————————————————— [Action: Success] Workstation I: Whaling successfully played [Asset] Workstation I: Attack stage is now Execution [Asset] ERP System: New attack path unlocked [Asset] File Server: New attack path unlocked [Asset] LAN: New attack path unlocked [Asset] Web Server: New attack path unlocked [Asset] Workstation II: New attack path unlocked [Damage] Workstation I: Whaling deals 3 point(s) of I damage [Effect] Whaling triggers Privilege Escalation [Player] 7 turn(s) remaining [Detection] Workstation I: DNS Blacklisting (successful) detected [Asset] Workstation I: Attack stage is now Initial Access [Heal] Workstation I: DNS Blacklisting recovers -3 point(s) of I damage [Effect] DNS Blacklisting triggers Damage Shield [Game] Turn started: 4 ————————————————————————————————————————————————————————————————————— [Action: Success] Workstation I: Screen Share Abuse successfully played [Prevention] Workstation I: Least Functionality prevents 1 point(s) of I damage [Damage] Workstation I: Screen Share Abuse deals no damage [Player] 6 turn(s) remaining [Game] Turn started: 5 ————————————————————————————————————————————————————————————————————— [Player] Total amount spent: 0.5 credit(s) [Inventory] Malicious Web Server procured [Action: Failure] Workstation II: Drive-By Compromise unsuccessfully played [Player] 5 turn(s) remaining [Game] Turn started: 6 ————————————————————————————————————————————————————————————————————— [Action: Success] Workstation I: Malicious USB Drive successfully played [Asset] Workstation I: Attack stage is now Execution [Prevention] Workstation I: Least Functionality prevents 1 point(s) of I damage [Damage] Workstation I: Malicious USB Drive deals 1 point(s) of I damage [Effect] Malicious USB Drive triggers Defense Penalty [Player] 4 turn(s) remaining [Detection] Workstation I: Hardware Eviction (successful) detected [Heal] Workstation I: Hardware Eviction recovers -1 point(s) of I damage [Effect] Hardware Eviction triggers Remove Persistence [Game] Turn started: 7 ————————————————————————————————————————————————————————————————————— [Action: Failure] Workstation II: Phishing (Access) unsuccessfully played [Player] 3 turn(s) remaining [Game] Turn started: 8 ————————————————————————————————————————————————————————————————————— [Action: Failure] Workstation I: Firmware Corruption unsuccessfully played [Player] 2 turn(s) remaining [Game] Turn started: 9 ————————————————————————————————————————————————————————————————————— [Action: Failure] Workstation I: System Data Encryption unsuccessfully played [Player] 1 turn(s) remaining [Game] Turn started: 10 ————————————————————————————————————————————————————————————————————— [Player] Total amount spent: 1 credit(s) [Inventory] Data Wiper procured [Action: Success] Workstation I: Storage Wipe successfully played [Asset] Workstation I: Attack stage is now Execution [Prevention] Workstation I: Software Use Restriction prevents 1 point(s) of A damage [Damage] Workstation I: Storage Wipe deals 1 point(s) of A damage [Player] 0 turn(s) remaining [Game] Game outcome: Defeat [Game] Game ended DEFENDER ######## [Game] Game started [Player] Total amount spent: 7.5 credit(s) [Inventory] Mail Gateway I procured [Inventory] Network-based IDS I procured [Inventory] Host-based IPS I procured [Inventory] Packet Filter I procured [Inventory] Vulnerability Scanner I procured [Action: Success] Workstation I: Sender Reputation Analysis successfully played [Effect] Sender Reputation Analysis triggers Detection Boost [Action: Success] Workstation II: Sender Reputation Analysis successfully played [Effect] Sender Reputation Analysis triggers Detection Boost [Player] Total amount spent: 4.5 credit(s) [Inventory] Config Mgmt Policy procured [Action: Success] LAN: Least Functionality successfully played [Effect] Least Functionality triggers Damage Shield [Effect] Least Functionality triggers Attack Penalty [Effect] Least Functionality triggers Insight Prevention [Action: Success] Web Server: Least Functionality successfully played [Effect] Least Functionality triggers Damage Shield [Effect] Least Functionality triggers Attack Penalty [Effect] Least Functionality triggers Insight Prevention [Action: Success] File Server: Least Functionality successfully played [Effect] Least Functionality triggers Damage Shield [Effect] Least Functionality triggers Attack Penalty [Effect] Least Functionality triggers Insight Prevention [Action: Success] ERP System: Least Functionality successfully played [Effect] Least Functionality triggers Damage Shield [Effect] Least Functionality triggers Attack Penalty [Effect] Least Functionality triggers Insight Prevention [Action: Success] Workstation I: Least Functionality successfully played [Effect] Least Functionality triggers Damage Shield [Effect] Least Functionality triggers Attack Penalty [Effect] Least Functionality triggers Insight Prevention [Action: Success] Workstation II: Least Functionality successfully played [Effect] Least Functionality triggers Damage Shield [Effect] Least Functionality triggers Attack Penalty [Effect] Least Functionality triggers Insight Prevention [Action: Success] LAN: Software Use Restriction successfully played [Effect] Software Use Restriction triggers Damage Shield [Effect] Software Use Restriction triggers Attack Penalty [Action: Success] Web Server: Software Use Restriction successfully played [Effect] Software Use Restriction triggers Damage Shield [Effect] Software Use Restriction triggers Attack Penalty [Action: Success] File Server: Software Use Restriction successfully played [Effect] Software Use Restriction triggers Damage Shield [Effect] Software Use Restriction triggers Attack Penalty [Action: Success] ERP System: Software Use Restriction successfully played [Effect] Software Use Restriction triggers Damage Shield [Effect] Software Use Restriction triggers Attack Penalty [Action: Success] Workstation I: Software Use Restriction successfully played [Effect] Software Use Restriction triggers Damage Shield [Effect] Software Use Restriction triggers Attack Penalty [Action: Success] Workstation II: Software Use Restriction successfully played [Effect] Software Use Restriction triggers Damage Shield [Effect] Software Use Restriction triggers Attack Penalty [Action: Success] Web Server: URL Analysis successfully played [Effect] URL Analysis triggers Detection Boost [Action: Success] Workstation I: URL Analysis successfully played [Effect] URL Analysis triggers Detection Boost [Action: Success] Workstation II: URL Analysis successfully played [Effect] URL Analysis triggers Detection Boost [Game] Turn started: 2 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Player] Total amount spent: 1.5 credit(s) [Inventory] Account Monitor I procured [Action: Success] LAN: User Access Pattern Analysis successfully played [Effect] User Access Pattern Analysis triggers Detection Boost [Action: Success] Web Server: User Access Pattern Analysis successfully played [Effect] User Access Pattern Analysis triggers Detection Boost [Action: Success] File Server: User Access Pattern Analysis successfully played [Effect] User Access Pattern Analysis triggers Detection Boost [Action: Success] ERP System: User Access Pattern Analysis successfully played [Effect] User Access Pattern Analysis triggers Detection Boost [Action: Success] Workstation I: User Access Pattern Analysis successfully played [Effect] User Access Pattern Analysis triggers Detection Boost [Action: Success] Workstation II: User Access Pattern Analysis successfully played [Effect] User Access Pattern Analysis triggers Detection Boost [Game] Turn started: 3 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Detection] Workstation I: Whaling (successful) detected [Asset] Workstation I: Attack stage is now Execution [Asset] ERP System: New attack path unlocked [Asset] File Server: New attack path unlocked [Asset] LAN: New attack path unlocked [Asset] Web Server: New attack path unlocked [Asset] Workstation II: New attack path unlocked [Damage] Workstation I: Whaling deals 3 point(s) of I damage [Effect] Whaling triggers Privilege Escalation [Action: Success] Workstation I: DNS Blacklisting successfully played [Asset] Workstation I: Attack stage is now Initial Access [Heal] Workstation I: DNS Blacklisting recovers -3 point(s) of I damage [Effect] DNS Blacklisting triggers Damage Shield [Game] Turn started: 4 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Player] Total amount spent: 0.5 credit(s) [Inventory] Honeypot I procured [Action: Failure] Workstation I: Decoy System unsuccessfully played [Game] Turn started: 5 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Effect] Workstation I: Effect Detection Boost placed by Sender Reputation Analysis expired [Effect] Workstation II: Effect Detection Boost placed by Sender Reputation Analysis expired [Detection] Workstation II: Drive-By Compromise (failed) detected [Action: Failure] LAN: Vulnerability Scan unsuccessfully played [Action: Failure] Web Server: Vulnerability Scan unsuccessfully played [Action: Failure] File Server: Vulnerability Scan unsuccessfully played [Action: Failure] ERP System: Vulnerability Scan unsuccessfully played [Action: Failure] Workstation I: Vulnerability Scan unsuccessfully played [Action: Failure] Workstation II: Vulnerability Scan unsuccessfully played [Game] Turn started: 6 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Effect] Web Server: Effect Detection Boost placed by URL Analysis expired [Effect] Workstation I: Effect Detection Boost placed by URL Analysis expired [Effect] Workstation II: Effect Detection Boost placed by URL Analysis expired [Action: Success] Workstation I: Hardware Eviction successfully played [Heal] Workstation I: Hardware Eviction recovers -1 point(s) of I damage [Effect] Hardware Eviction triggers Remove Persistence [Game] Turn started: 7 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Effect] LAN: Effect Detection Boost placed by User Access Pattern Analysis expired [Effect] Web Server: Effect Detection Boost placed by User Access Pattern Analysis expired [Effect] File Server: Effect Detection Boost placed by User Access Pattern Analysis expired [Effect] ERP System: Effect Detection Boost placed by User Access Pattern Analysis expired [Effect] Workstation I: Effect Detection Boost placed by User Access Pattern Analysis expired [Effect] Workstation II: Effect Detection Boost placed by User Access Pattern Analysis expired [Detection] Workstation II: Phishing (Access) (failed) detected [Action: Success] Workstation II: Account Monitoring successfully played [Effect] Account Monitoring triggers Detection Boost [Game] Turn started: 8 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Detection] Workstation I: Firmware Corruption (failed) detected [Action: Failure] Workstation I: File Integrity Check unsuccessfully played [Game] Turn started: 9 ————————————————————————————————————————————————————————————————————— [Player] Periodic income increases budget by 0.3 credit(s) [Action: Success] Web Server: URL Analysis successfully played [Effect] URL Analysis triggers Detection Boost [Action: Success] Workstation I: URL Analysis successfully played [Effect] URL Analysis triggers Detection Boost [Action: Success] Workstation II: URL Analysis successfully played [Effect] URL Analysis triggers Detection Boost [Game] Game outcome: Victory [Game] Game ended