Sukana (Retired Investigation)
Scenario - Desi Sukana is an aspiring DFIR Analyst. These are professionals who gather and investigate vast amounts of data to fill in gaps in information about cyber attacks. He…
Scenario - Desi Sukana is an aspiring DFIR Analyst. These are professionals who gather and investigate vast amounts of data to fill in gaps in information about cyber attacks. He…
Scenario - One of the Desktops in the research lab at Organization X is suspected to have been accessed by someone unauthorized. Although they generally have only one user account…
Scenario - A highly confidential document has been stolen from the President's laptop and has been sold on the Dark Web. The Secret Service thinks someone with physical access to…
IMPORTANT NOTES NTFS - Master File Table Like the File Allocation Table, there is a Master File Table in NTFS. However, the Master File Table, or MFT, is much more…
Scenario - In a race against time, can you investigate a laptop seized by law enforcement to identify if a bomb threat is real or a hoax? MITTRE T1573 for…
Scenario - Your organization doesn't use Amazon Web Services, so when a Threat Hunter starts seeing connections to multiple EC2 instances, it's time to start hunting to understand what happened,…
Experience taking the BTLO1 As a reference, before taking the BTL1 exam, I had my Sec+ and I was freshly graduated from Montgomery College. The websites that I used as…
In the attached virtual machine, view the information in email2.txt and reconstruct the PDF using the base64 data. What is the text within the PDF? cat base64email2.txt | base64 -d…
Scenario - Samuel (Sam) is a Neatnik, when it comes to cleanliness and hygiene. Find out if he also follows cyber hygiene. An incident has been reported stating “Sam has…