일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
- 철학
- 리버싱
- CodeEngn
- BoB 12기
- 에밀 뒤르켐
- BoB 12기 최종합격 후기
- codeengn basic rce 01
- bob
- 디지털 포렌식 트랙
- CodeEngn Basic 5
- 코드엔진
- malware
- 코드엔진 basic 5
- 코드엔진 베이직
- 사회적 사실
- Best of the Best
- 논문리뷰
- 사회분업론
- CodeEngn Basic 01
- h4ckinggame
- 자살론
- Today
- Total
목록Wargame/CyberDefenders (12)
SEO
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/IgEjR/btsMe2D0hw1/5X6EfHCOiuwTaQM5sK8Hk1/img.png)
ScenarioThe SOC team has identified suspicious activity on a web server within the company's intranet. To better understand the situation, they have captured network traffic for analysis. The PCAP file may contain evidence of malicious activities that led to the compromise of the Apache Tomcat web server. Your task is to analyze the PCAP file to understand the scope of the attack. Q1. Given the ..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/biMhc8/btsMbFIKj5r/edxbPhTBsnykZWAie6Cjy1/img.png)
ScenarioA blockchain development company detected unusual activity when an employee was redirected to an unfamiliar website while accessing a DAO management platform. Soon after, multiple cryptocurrency wallets linked to the organization were drained. Investigators suspect a malicious tool was used to steal credentials and exfiltrate funds.Your task is to analyze the provided intelligence to unc..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/SR7EL/btsL2bBirLv/NbM8iOniCxzBLOD3ag4C41/img.png)
ScenarioWe're currently in the midst of a murder investigation, and we've obtained the victim's phone as a key piece of evidence. After conducting interviews with witnesses and those in the victim's inner circle, your objective is to meticulously analyze the information we've gathered and diligently trace the evidence to piece together the sequence of events leading up to the incident. Q1. Based..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/vKhRG/btsL2lXIOzE/GIkVG4QEWPYNm4dSRtKrrK/img.png)
ScenarioYou are a cybersecurity analyst working in the Security Operations Center (SOC) of BookWorld, an expansive online bookstore renowned for its vast selection of literature. BookWorld prides itself on providing a seamless and secure shopping experience for book enthusiasts around the globe. Recently, you've been tasked with reinforcing the company's cybersecurity posture, monitoring network..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/Bs73g/btsLN2rCfc6/PgIrJltM4CHdUD0N9CK2Q1/img.png)
ScenarioA large multinational corporation heavily relies on the 3CX software for phone communication, making it a critical component of their business operations. After a recent update to the 3CX Desktop App, antivirus alerts flag sporadic instances of the software being wiped from some workstations while others remain unaffected. Dismissing this as a false positive, the IT team overlooks the al..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/bc8hJ9/btsLLA8Q5vj/MjfIhQsxhwWzz1OHXsKBO0/img.png)
ScenarioYou are a forensic investigator at a financial institution, and your SIEM flagged unusual activity on a workstation with access to sensitive financial data. Suspecting a breach, you received a memory dump from the compromised machine. Your task is to analyze the memory for signs of compromise, trace the anomaly's origin, and assess its scope to contain the incident effectively. Q1. Ident..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/w44sU/btsLGcaceda/lt1hX3F9ktwZuRqYhkJ9iK/img.png)
ScenarioYou are an investigator assigned to assist Drumbo, a company that recently fell victim to a ransomware attack. The attack began when an employee received an email that appeared to be from the boss. It featured the company’s logo and a familiar email address. Believing the email was legitimate, the employee opened the attachment, which compromised the system and deployed ransomware, encry..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/wizxF/btsLFxX1x1Z/9JlENkRIKkh0jKqZDDMb0k/img.png)
ScenarioThe SOC team has detected suspicious activity in the network traffic, revealing that a machine has been compromised. Sensitive company information has been stolen. Your task is to use Network Capture (PCAP) files and Threat Intelligence to investigate the incident and determine how the breach occurred. Q1. What is the name of the malicious file used for initial access?File > export objec..