일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 |
- 필기
- 디지털 포렌식 전문가 2급
- 코드엔진
- 디포전
- cve-2022-26923
- malware
- DLL 사이드로딩
- bob
- CodeEngn
- Active Directory
- dll side-loading
- h4ckinggame
- BoB 12기 최종합격 후기
- 세마포어
- 논문리뷰
- cve-2024-6387
- BoB 12기
- 리버싱
- 뮤텍스
- 프로그래머스
- 디포전 2급
- 디지털 포렌식 트랙
- 정보보안기사
- race condition
- 정보기
- Best of the Best
- Today
- Total
목록Wargame (62)
SEO
보호되어 있는 글입니다.
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioThe SOC team has identified suspicious activity on a web server within the company's intranet. To better understand the situation, they have captured network traffic for analysis. The PCAP file may contain evidence of malicious activities that led to the compromise of the Apache Tomcat web server. Your task is to analyze the PCAP file to understand the scope of the attack. Q1. Given the ..

ScenarioA blockchain development company detected unusual activity when an employee was redirected to an unfamiliar website while accessing a DAO management platform. Soon after, multiple cryptocurrency wallets linked to the organization were drained. Investigators suspect a malicious tool was used to steal credentials and exfiltrate funds.Your task is to analyze the provided intelligence to unc..
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioWe're currently in the midst of a murder investigation, and we've obtained the victim's phone as a key piece of evidence. After conducting interviews with witnesses and those in the victim's inner circle, your objective is to meticulously analyze the information we've gathered and diligently trace the evidence to piece together the sequence of events leading up to the incident. Q1. Based..