일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |
- DLL 사이드로딩
- h4ckinggame
- 필기
- 논문리뷰
- BoB 12기 최종합격 후기
- dll side-loading
- CodeEngn
- 디지털 포렌식 전문가 2급
- 리버싱
- 뮤텍스
- BoB 12기
- malware
- 디지털 포렌식 트랙
- 디포전 2급
- bob
- 정보보안기사
- 디포전
- 프로그래머스
- 세마포어
- Active Directory
- cve-2024-6387
- 코드엔진
- 정보기
- cve-2022-26923
- Best of the Best
- race condition
- Today
- Total
목록Wargame (62)
SEO
보호되어 있는 글입니다.
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioThe SOC team has identified suspicious activity on a web server within the company's intranet. To better understand the situation, they have captured network traffic for analysis. The PCAP file may contain evidence of malicious activities that led to the compromise of the Apache Tomcat web server. Your task is to analyze the PCAP file to understand the scope of the attack. Q1. Given the ..

ScenarioA blockchain development company detected unusual activity when an employee was redirected to an unfamiliar website while accessing a DAO management platform. Soon after, multiple cryptocurrency wallets linked to the organization were drained. Investigators suspect a malicious tool was used to steal credentials and exfiltrate funds.Your task is to analyze the provided intelligence to unc..
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioWe're currently in the midst of a murder investigation, and we've obtained the victim's phone as a key piece of evidence. After conducting interviews with witnesses and those in the victim's inner circle, your objective is to meticulously analyze the information we've gathered and diligently trace the evidence to piece together the sequence of events leading up to the incident. Q1. Based..