SOC Alpha 2
Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the […]
Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the […]
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the
Venom Lab: Investigating Compromised Ubuntu Server Read More »
Scenario It was recently discovered that one of our web application servers had been compromised, and the IMP Incident Response
Snowflake lab: Unearthing Criminal Activities via Server Logs Read More »
Lab Scenario Exorcise Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code. You must dismantle its hooks,
Nonyx: Reverse Engineering Malware Code Read More »
Scenario Jake, a Transgear Corp Incident Response analyst, delves into an alert from Brianna, who flagged unusual activity on her
SOC: Vortex Lab Walkthrough Read More »
Scenario : Allam, a senior infrastructure engineer at EZ-CERT, is known for hosting his annual “Haunted Festival” every Halloween. This year,
Digital Forensics – Masquerade Read More »