This document analyzes network traffic from a Christmas hacking challenge. It identifies 4 main events: 1) An email from Grandma to Mel revealing a plot and location; 2) Probing of a vulnerable web server; 3) A SQL injection exploiting DNS poisoning; 4) Infection of Rudolph's computer redirecting an iTunes update. The analysis details the key hosts and IP addresses involved and provides a visualization of the attack sequence.