MagneticNomad5713
Forensic Maestro
1947 / 5066 XP to level 64
*Rankings computed based on core modules (96007 pts).
Joined in July, 2025
MagneticNomad5713 earned 14 badges
Download Your Certificate!
You've completed games and earned badges! Click on any badge below to view and download your certificate!

Frognado In Valdoria
This analyst successfully investigated a hacktivist intrusion on FramtidX system. Through their use of Kusto Query Language (KQL), they discovered how the intruders managed to deface the company’s website and internal documents. They followed the activities of the threat actor, from reconnaissance to exfiltration, and uncovered the use of an internal account to further their compromise.
Issued on: Jul 28, 2025

Valdorian Times
This analyst investigated an email phishing attack in Valdoria that uncovered a politically motivated influence campaign. Using Kusto Query Language (KQL), they analyzed employee roles, email communications, and computer process events, revealing evidence of data exfiltration and manipulation. This exercise reinforced skill in querying data and understanding data integrity within a cybersecurity context.
Issued on: Jul 24, 2025

Rap Beef
This analyst investigated a themed scenario involving rival hip-hop artists. They used key cybersecurity skills to identify suspicious communications and activities, analyzing internal messages to track unauthorized exchanges and uncover patterns. This exercise reinforced critical skills in data analysis, threat detection, and the application of cybersecurity principles in unconventional contexts.
Issued on: Jul 23, 2025

Jojo's Hospital
This analyst completed the JoJo's Hospital module, investigating a cyber attack involving an Initial Access Broker and a Ransomware-as-a-Service (RaaS) operation. They demonstrated skills in detecting phishing and malvertising tactics, tracing unauthorized network access, understanding hacker collaboration, and analyzing ransomware activities.
Issued on: Jul 30, 2025
.png)
Titan Shield
This analyst successfully investigated two highly sophisticated cyberattacks against TitanShield’s sensitive projects, demonstrating advanced investigative skills in identifying social engineering tactics, malicious file execution, and data exfiltration strategies. Using Kusto Query Language (KQL), they unraveled Moonstone Sleet's phishing campaign targeting Project Omega and Crimson Sandstorm’s romance scheme aimed at harvesting critical system and user information. This exercise reinforced skills in threat actor profiling, recognizing social engineering-based reconnaissance on social media, and assessing the broader security implications of protecting intellectual property in a high-stakes defense context.
Issued on: Jul 31, 2025

Celestial Cowboy Couture
This analyst completed the "Celestial Cowboy Couture" module, where they investigated a targeted phishing attack that resulted in data exfiltration and intellectual property theft. They demonstrated proficiency in using Kusto Query Language (KQL) to trace the attack, analyzing network traffic and credential misuse. The investigation involved connecting threat actor tactics, including the exploitation of an employee’s LinkedIn post to craft a convincing phishing email. By uncovering the full attack chain, the analyst successfully identified the real culprit and restored the company’s reputation.
Issued on: Jul 31, 2025

AzureCrest
This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context.
Issued on: Aug 08, 2025

Azure Crest
This analyst successfully investigated a ransomware attack against a hospital. They demonstrated the ability to pivot around datasets using Kusto Query Language (KQL) to uncover the risks associated with prioritizing cost over security. This exercise reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context.
Issued on: Aug 08, 2025

Critical Compromise (ICS)
This analyst completed the Critical Compromise in Chicago module, demonstrating their ability to investigate a malware-based attack on a SCADA system. Through their use of Kusto Query Language (KQL), they uncovered the deployment of malicious software that disrupted the power grid. Their investigation helped identify the attack's origin and provided insights into the attackers’ methods, ultimately contributing to the restoration of normal operations and improving defenses for critical infrastructure.
Issued on: Aug 23, 2025

GalaxyNeura
This badge is awarded to threat hunters who successfully utilize the GalaxyNeura Module to identify, analyze, and mitigate insider threats, showcasing expertise in detecting malicious activity within trusted environments.
Issued on: Aug 25, 2025

Envolve Labs
This analyst completed the "Envolve Labs" module. They demonstrated skills in using Kusto Query Language (KQL) in their investigation that included identifying phishing campaigns, analyzing command-line activities, and uncovering credential theft and data exfiltration. They also learned to cluster and attribute attacks to specific threat actors, connecting malicious domains and email addresses to threat actor behavior.
Issued on: Nov 07, 2025

Sunlands ☀️🚀🧑🚀
This analyst investigated a sophisticated cyber attack on the Sunlands Aeronautics and Space Administration (SASA). They demonstrated advanced skills in detecting phishing attacks, analyzing malicious file downloads, and uncovering command and control infrastructure and persistence mechanisms. This exercise showcased their ability to respond to advanced cyber threats using threat actor tactics, techniques, and procedures (TTPs).
Issued on: Nov 15, 2025

Advanced Persistent Analyst
Someone who failed, got up, and tried again!
Issued on: Nov 23, 2025

Krusty Krab
This analyst completed the "Krusty Krab" module, investigating a phishing attack and data exfiltration. They used Kusto Query Language (KQL) to analyze email and network logs, revealing the use of deceptive email addresses and malicious domains. This exercise emphasized their ability to pivot and connect malicious domains to threat actor behavior, showcasing their proficiency in threat detection and analysis.
Issued on: Nov 29, 2025
MagneticNomad5713 played 24 games
Level 1: A Scandal in Valdoria 2430/2430
Level 1: Solvi Systems 0/2860
Level 1: A Rap Beef (START HERE) 950/950
Level 1: Jojo's Hospital 610/610
Level 1: Titan Shield (with Microsoft Defender XDR) 4000/4000
Level 1: Cowboy Couture 2040/2040
Level 1: Valdoria Votes 2750/2750
Level 1: KQL 101 1645/1645
Level 2: Envolve Labs: With a twist! 950/950
Level 2: KRUSTY KRAB 7360/7360
Level 2: Castle & Sand 9400/13050
Level 2: AzureCrest - The full version 8790/8790
Level 2: Frognado in Valdoria 1690/1690
Level 2: Critical Compromise In Chicago - ICS 2870/2870
Level 2: French Socksess Story 2080/2080
Level 2: Turkey Bowl 2590/2590
Level 3: System Shutdown at Azure Crest! (Short Version) 4800/4800
Level 3: VirusTotal Fundamentals 1320/2620
Level 3: Galaxy Neura 1265/1265
Level 3: Empire Health 1195/1195
Level 4: Sunlands 8437/8437
Level 4: Spooky Sweets 3290/7640
Level 5: MCJ Walker 14265/15265
Level 5: A Rap Steak 13410/19010
Pattern of Life
Issue Badge to MagneticNomad5713
| # | Image | Badge | Description | Action |
|---|---|---|---|---|
| 1 | ![]() | Helping Hand | This award is community-nominated! Someone in the KC7 community has recognized this user for their contributions to others! | |
| 2 | ![]() | Notre Dame Challenge | Completed the cybersecurity challenge event at Notre Dame in June 2023 | |
| 3 | ![]() | KC7 Top 10 (2023) | Awarded to top 10 KC7 players in 2023 | |
| 4 | ![]() | Cyber Challenge Series: Team Winner | This badge is issued to KC7 players who were members of a team that placed top 3 in a Blue Team Cyber Challenge event! | |
| 5 | ![]() | Super Fan | This badge is issued to any KC7 player who has completed 3 modules or more! | |
| 6 | ![]() | Most Improved | Someone who really improved over the course of a KC7 event! | |
| 7 | ![]() | Cyber Challenge Series: Winner | This badge is issued to KC7 players who placed top 3 (as an individual) in an Blue Team Cyber Challenge event! | |
| 8 | ![]() | 30 day hot steak | Awarded to a user who has answered a question for 30 days in a row. | |
| 9 | ![]() | 90 day streak | Awarded to a user who has answered a question for 90 days in a row. | |
| 10 | ![]() | Inside Encryptodera - Event Participant | Participant in the February 2024 monthly event featuring the Encryptodera module | |
| 11 | ![]() | The Teacher | Someone who really helped lift up their peers and enabled others to learn! | |
| 12 | ![]() | Bright Future | Someone who shows a lot of potential as a future cyber analyst! | |
| 13 | ![]() | Azure Crest | This analyst investigated a ransomware attack, where cost-cutting measures led to a single point of failure in their systems. This exercise highlighted the risks associated with prioritizing cost over security and reinforced skills in identifying vulnerabilities and understanding the broader implications of inadequate security measures in a healthcare context. | |
| 14 | ![]() | 2024 SANS New2Cyber CTF Participant | This badge has been awarded to those who took part in the 2024 SANS New2Cyber x KC7 Capture The Flag (CTF) challenge, which involved investigating a ransomware attack on a hospital. | |
| 15 | ![]() | 60 day streak | Awarded to a user who has answered a question for 60 days in a row. | |
| 16 | ![]() | 120 day streak | Awarded to a user who has answered a question for 120 days in a row! | |
| 17 | ![]() | Intro Master | ||
| 18 | ![]() | Wiccon25 | You've participated to the WICCON25 workshop! You've successfully uncovered the full attack chain of a zombie themed ransomware. |

.png)
















