일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |
- bob
- DLL 사이드로딩
- dll side-loading
- 리버싱
- race condition
- 프로그래머스
- Active Directory
- 논문리뷰
- malware
- 디지털 포렌식 트랙
- 디포전
- BoB 12기 최종합격 후기
- 정보기
- 디지털 포렌식 전문가 2급
- CodeEngn
- BoB 12기
- cve-2022-26923
- 세마포어
- 뮤텍스
- 정보보안기사
- 코드엔진
- Best of the Best
- h4ckinggame
- 필기
- 디포전 2급
- cve-2024-6387
- Today
- Total
목록Wargame (62)
SEO
보호되어 있는 글입니다.
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioThe SOC team has identified suspicious activity on a web server within the company's intranet. To better understand the situation, they have captured network traffic for analysis. The PCAP file may contain evidence of malicious activities that led to the compromise of the Apache Tomcat web server. Your task is to analyze the PCAP file to understand the scope of the attack. Q1. Given the ..

ScenarioA blockchain development company detected unusual activity when an employee was redirected to an unfamiliar website while accessing a DAO management platform. Soon after, multiple cryptocurrency wallets linked to the organization were drained. Investigators suspect a malicious tool was used to steal credentials and exfiltrate funds.Your task is to analyze the provided intelligence to unc..
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioWe're currently in the midst of a murder investigation, and we've obtained the victim's phone as a key piece of evidence. After conducting interviews with witnesses and those in the victim's inner circle, your objective is to meticulously analyze the information we've gathered and diligently trace the evidence to piece together the sequence of events leading up to the incident. Q1. Based..