Log Analysis Privilege Escalation
Log Analysis - Privilege Escalation Lab link: BTLO Challenges Having to infer without a full view of what happened Pros I had fun mapping out the attackers moves with...
Log Analysis - Privilege Escalation Lab link: BTLO Challenges Having to infer without a full view of what happened Pros I had fun mapping out the attackers moves with...
Suspicious USB Stick Lab link: BTLO Challenges Figuring out how to use peepdf to analyse the file Pros I learnt a new tool that is an awesome addition to my arsenal ...
Log Analysis – Compromised WordPress Lab link: BTLO Scenario One of our WordPress sites has been compromised but we’re currently unsure how. The primary hypothesis is that an installed plugin wa...
Malicious PowerShell Analysis Scenario Recently the networks of a large company named GothamLegend were compromised after an employee opened a phishing email containing malware. The damage caused...
Network Analysis - Malware Compromise Scenario A SOC Analyst at Umbrella Corporation is going through SIEM alerts and sees the alert for connections to a known malicious domain. The traffic is co...