Sukana (Retired Investigation)

Scenario - Desi Sukana is an aspiring DFIR Analyst. These are professionals who gather and investigate vast amounts of data to fill in gaps in information about cyber attacks. He…

Comments Off on Sukana (Retired Investigation)

Windows Forensic 1 Investigation

Scenario - One of the Desktops in the research lab at Organization X is suspected to have been accessed by someone unauthorized. Although they generally have only one user account…

Comments Off on Windows Forensic 1 Investigation

Windows Forensic 2 Investigation

IMPORTANT NOTES NTFS - Master File Table Like the File Allocation Table, there is a Master File Table in NTFS. However, the Master File Table, or MFT, is much more…

Comments Off on Windows Forensic 2 Investigation

Drilldown (Retired Investigation)

Scenario - Your organization doesn't use Amazon Web Services, so when a Threat Hunter starts seeing connections to multiple EC2 instances, it's time to start hunting to understand what happened,…

Comments Off on Drilldown (Retired Investigation)

Phishing Analysis Fundamentals

In the attached virtual machine, view the information in email2.txt and reconstruct the PDF using the base64 data. What is the text within the PDF? cat base64email2.txt | base64 -d…

Comments Off on Phishing Analysis Fundamentals

Sam (Retired Investigation)

Scenario - Samuel (Sam) is a Neatnik, when it comes to cleanliness and hygiene. Find out if he also follows cyber hygiene. An incident has been reported stating “Sam has…

Comments Off on Sam (Retired Investigation)