일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
- 코드엔진 basic 5
- 리버싱
- malware
- CodeEngn
- 디지털 포렌식 트랙
- h4ckinggame
- 코드엔진
- CodeEngn Basic 5
- bob
- BoB 12기 최종합격 후기
- 코드엔진 베이직
- 논문리뷰
- CodeEngn Basic 01
- 사회분업론
- codeengn basic rce 01
- BoB 12기
- Best of the Best
- 사회적 사실
- 에밀 뒤르켐
- 자살론
- 철학
- Today
- Total
목록Wargame/CyberDefenders (11)
SEO
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/biMhc8/btsMbFIKj5r/edxbPhTBsnykZWAie6Cjy1/img.png)
ScenarioA blockchain development company detected unusual activity when an employee was redirected to an unfamiliar website while accessing a DAO management platform. Soon after, multiple cryptocurrency wallets linked to the organization were drained. Investigators suspect a malicious tool was used to steal credentials and exfiltrate funds.Your task is to analyze the provided intelligence to unc..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/SR7EL/btsL2bBirLv/NbM8iOniCxzBLOD3ag4C41/img.png)
ScenarioWe're currently in the midst of a murder investigation, and we've obtained the victim's phone as a key piece of evidence. After conducting interviews with witnesses and those in the victim's inner circle, your objective is to meticulously analyze the information we've gathered and diligently trace the evidence to piece together the sequence of events leading up to the incident. Q1. Based..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/vKhRG/btsL2lXIOzE/GIkVG4QEWPYNm4dSRtKrrK/img.png)
ScenarioYou are a cybersecurity analyst working in the Security Operations Center (SOC) of BookWorld, an expansive online bookstore renowned for its vast selection of literature. BookWorld prides itself on providing a seamless and secure shopping experience for book enthusiasts around the globe. Recently, you've been tasked with reinforcing the company's cybersecurity posture, monitoring network..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/Bs73g/btsLN2rCfc6/PgIrJltM4CHdUD0N9CK2Q1/img.png)
ScenarioA large multinational corporation heavily relies on the 3CX software for phone communication, making it a critical component of their business operations. After a recent update to the 3CX Desktop App, antivirus alerts flag sporadic instances of the software being wiped from some workstations while others remain unaffected. Dismissing this as a false positive, the IT team overlooks the al..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/bc8hJ9/btsLLA8Q5vj/MjfIhQsxhwWzz1OHXsKBO0/img.png)
ScenarioYou are a forensic investigator at a financial institution, and your SIEM flagged unusual activity on a workstation with access to sensitive financial data. Suspecting a breach, you received a memory dump from the compromised machine. Your task is to analyze the memory for signs of compromise, trace the anomaly's origin, and assess its scope to contain the incident effectively. Q1. Ident..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/w44sU/btsLGcaceda/lt1hX3F9ktwZuRqYhkJ9iK/img.png)
ScenarioYou are an investigator assigned to assist Drumbo, a company that recently fell victim to a ransomware attack. The attack began when an employee received an email that appeared to be from the boss. It featured the company’s logo and a familiar email address. Believing the email was legitimate, the employee opened the attachment, which compromised the system and deployed ransomware, encry..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/wizxF/btsLFxX1x1Z/9JlENkRIKkh0jKqZDDMb0k/img.png)
ScenarioThe SOC team has detected suspicious activity in the network traffic, revealing that a machine has been compromised. Sensitive company information has been stolen. Your task is to use Network Capture (PCAP) files and Threat Intelligence to investigate the incident and determine how the breach occurred. Q1. What is the name of the malicious file used for initial access?File > export objec..
ScenarioYour cybersecurity team has been alerted to suspicious activity on your organization's network. Several employees reported unusual behavior in their browsers after installing what they believed to be a helpful browser extension named "ChatGPT". However, strange things started happening: accounts were being compromised, and sensitive information appeared to be leaking.Your task is to perf..