Module 13: Incident Response Challenge Labs
Last updated
Last updated
DEV - Development Machine for Defensive Teams
FILE1 - SMB Shares for departmental file storage
INTERNAL1 - Enterprise Applications
DC1 - Domain Controller for the Megacorp One Active Directory Domain
WK1 - h.jones (IT and Domain Admin)
WK2 - e.brown (Human Resources)
WK3 - n.harris (Sales)
WK4 - c.davis (Finance)
Phase 1 begins when the SOC team notices that several Splunk alerts have been triggered. They escalate the situation to you, a member of the Incident Response team. Your task is to review the triggered alerts, determine which are false positives, and identify the one(s) requiring detailed investigation.
Phase 2 involves performing a forensic analysis on a disk image provided by a colleague from another branch of the company's Incident Response team. Based on their analysis, the disk image may contain the key to decrypt all files affected by a ransomware attack in their branch.
Enter required information via the flags.exe to get a hash. If it matches one of their provided 10, enter it as the answer.
Do the Challenge Lab and take the exam.
SPLUNK - SIEM