YogasatriautamaBTLO: Log Analysis — SysmonScenario: You are provided with Sysmon logs from a compromised endpoint. Analyse the logs to find out the steps and techniques used by the…6h ago6h ago
YogasatriautamaBTLO: Network Analysis — Malware CompromiseScenario: A SOC Analyst at Umbrella Corporation is going through SIEM alerts and sees the alert for connections to a known malicious domain10h ago10h ago
YogasatriautamaBTLO: Log Analysis — Compromised WordPressScenario: One of our WordPress sites has been compromised but we’re currently unsure how. The primary hypothesis is that an installed…15h ago15h ago
YogasatriautamaBTLO: Suspicious USB StickScenario: One of our clients informed us they recently suffered an employee data breach. As a startup company, they had a constrained…21h ago21h ago
YogasatriautamaBTLO: MetaScenario: The attached images were posted by a criminal on the run, with the caption “I’m roaming free. You will never catch me”22h ago22h ago
YogasatriautamaBTLO: FollinaScenario: On a Friday evening when you were in a mood to celebrate your weekend, your team was alerted with a new RCE vulnerability…1d ago1d ago
YogasatriautamaForensic: Threat hunting Windows Event Log with Hayabusa & Timeline ExplorerHayabusa is a Windows event log fast forensics timeline generator and threat hunting tool. The output will be consolidated into a single…1d ago1d ago
YogasatriautamaForensic: Analysis Flash Disk with FTK Imager & AutopsyScenario: We found a flashdiks on the road. Then we tried to investigate using FTK Imager and Autopsy.1d ago1d ago
YogasatriautamaCyberDefense: Insider Blue Team LabScenario: After Karen started working for ‘TAAUSAI,’ she began to do some illegal activities inside the company. ‘TAAUSAI’ hired you as a…1d ago1d ago