Digital Forensics – Yurei Lab
Scenario I’m Loner Varley, currently employed at Tech Innovator Inc., a cybersecurity start-up. Our company’s name may sound a bit […]
Digital Forensics – Yurei Lab Read More »
Scenario I’m Loner Varley, currently employed at Tech Innovator Inc., a cybersecurity start-up. Our company’s name may sound a bit […]
Digital Forensics – Yurei Lab Read More »
Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the
Venom Lab: Investigating Compromised Ubuntu Server Read More »
Scenario It was recently discovered that one of our web application servers had been compromised, and the IMP Incident Response
Snowflake lab: Unearthing Criminal Activities via Server Logs Read More »
Lab Scenario Exorcise Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code. You must dismantle its hooks,
Nonyx: Reverse Engineering Malware Code Read More »
Scenario Jake, a Transgear Corp Incident Response analyst, delves into an alert from Brianna, who flagged unusual activity on her
SOC: Vortex Lab Walkthrough Read More »