Forensics Challenges
5 challenges found
Exfiltration
Our IDS flagged suspicious outbound traffic from a workstation. The security team believes data was being exfiltrated,...
Access Denied
An application was accessed by an unauthorized user. We captured network traffic during the incident. Can you recover...
Packet Sniff
Our security team intercepted network traffic from a server that was recently compromised. The attacker connected...
Unusual Process
A security analyst discovered suspicious activity on a corporate workstation. A memory dump was captured during...
Shell Game
During a security incident, a memory dump was captured from a workstation suspected of running malicious scripts. Your...