LetsDefend: Windows Memory Dump
For this challenge we've been tasked with determining which user downloaded a malicious crack tool, where the file was downloaded, and what actions were taken by the second-stage payload.
For this challenge we've been tasked with determining which user downloaded a malicious crack tool, where the file was downloaded, and what actions were taken by the second-stage payload.
For this challenge we've been tasked with finding the malicious process running on a compromised endpoint and to determine which user is responsible. This write-up includes instructions for Volatility 2 and corresponding commands for Volatility 3.
This is a hard-difficulty challenge that requires us to analyze the disk image of a compromised linux system. We'll analyze various Linux system files and log files to gather the required information.
Investigate a compromised web server and determine what vulnerabilities were exploited by the attacker and what actions they performed.
For this challenge we are tasked with using Redline to conduct memory analysis of a compromised host.
For this challenge we are tasked with decrypting a ZIP that contains exfiltrated data.
This is a medium-difficulty challenge that requires the analysis of a pcap to determine the source of a compromise and actions performed by the attacker.
This challenge requires configuring firewalls on multiple devices.
In this NICE challenge, we are tasked with configuring network interfaces, DNS, Active Directory services, and account provisioning.
For this challenge we are tasked with creating user accounts, assigning privileges, updating apache, and configuring SSH.