일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |
- Active Directory
- 세마포어
- 리버싱
- h4ckinggame
- 코드엔진
- malware
- 디포전 2급
- 디지털 포렌식 트랙
- BoB 12기
- 논문리뷰
- 정보기
- cve-2024-6387
- 필기
- 디포전
- cve-2022-26923
- race condition
- 뮤텍스
- 프로그래머스
- DLL 사이드로딩
- BoB 12기 최종합격 후기
- bob
- 정보보안기사
- Best of the Best
- dll side-loading
- CodeEngn
- 디지털 포렌식 전문가 2급
- Today
- Total
목록Wargame (62)
SEO

ScenarioYou are a forensic investigator at a financial institution, and your SIEM flagged unusual activity on a workstation with access to sensitive financial data. Suspecting a breach, you received a memory dump from the compromised machine. Your task is to analyze the memory for signs of compromise, trace the anomaly's origin, and assess its scope to contain the incident effectively. Q1. Ident..
보호되어 있는 글입니다.
보호되어 있는 글입니다.
보호되어 있는 글입니다.
보호되어 있는 글입니다.

ScenarioYou are an investigator assigned to assist Drumbo, a company that recently fell victim to a ransomware attack. The attack began when an employee received an email that appeared to be from the boss. It featured the company’s logo and a familiar email address. Believing the email was legitimate, the employee opened the attachment, which compromised the system and deployed ransomware, encry..
보호되어 있는 글입니다.

ScenarioThe SOC team has detected suspicious activity in the network traffic, revealing that a machine has been compromised. Sensitive company information has been stolen. Your task is to use Network Capture (PCAP) files and Threat Intelligence to investigate the incident and determine how the breach occurred. Q1. What is the name of the malicious file used for initial access?File > export objec..