Network Capture Analysis & Threat Detection
Scenario Our detection team reported that they receive an IDS alert related to reconnaissance but they were unable to read […]
Network Capture Analysis & Threat Detection Read More »
Scenario Our detection team reported that they receive an IDS alert related to reconnaissance but they were unable to read […]
Network Capture Analysis & Threat Detection Read More »
Scenario You have been sent a phishing link – It is your task to investigate this website and find out
Phishing Analysis Lab 2 Read More »
Scenario You have been sent a phishing link — It is your task to investigate this website and find out
Phishing Analysis Lab 1 Read More »
Scenario I’m Loner Varley, currently employed at Tech Innovator Inc., a cybersecurity start-up. Our company’s name may sound a bit
Digital Forensics – Yurei Lab Read More »
Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the
Venom Lab: Investigating Compromised Ubuntu Server Read More »