Phishing Analysis Lab 2
Scenario You have been sent a phishing link – It is your task to investigate this website and find out […]
Phishing Analysis Lab 2 Read More »
Scenario You have been sent a phishing link – It is your task to investigate this website and find out […]
Phishing Analysis Lab 2 Read More »
Scenario You have been sent a phishing link — It is your task to investigate this website and find out
Phishing Analysis Lab 1 Read More »
Scenario I’m Loner Varley, currently employed at Tech Innovator Inc., a cybersecurity start-up. Our company’s name may sound a bit
Digital Forensics – Yurei Lab Read More »
Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the
Venom Lab: Investigating Compromised Ubuntu Server Read More »
Scenario It was recently discovered that one of our web application servers had been compromised, and the IMP Incident Response
Snowflake lab: Unearthing Criminal Activities via Server Logs Read More »