Let's Defend: Port Scan Activity
Challenge Link: https://app.letsdefend.io/challenge/port-scan-activity Log file: /root/Desktop/ChallengeFile/port_scan.pcap Question 1 What is the IP address scanning the environment? I started b...
Challenge Link: https://app.letsdefend.io/challenge/port-scan-activity Log file: /root/Desktop/ChallengeFile/port_scan.pcap Question 1 What is the IP address scanning the environment? I started b...
Challenge Link: https://app.letsdefend.io/challenge/http-basic-auth Log file: /root/Desktop/ChallengeFile/webserver.em0.pcap Question 1 How many HTTP GET requests are in pcap? First I loaded up t...
Challenge Link: https://app.letsdefend.io/challenge/disclose-the-agent Log file: /root/Desktop/ChallengeFile/smtpchallenge.pcap Question 1 What is the email address of Ann’s secret boyfriend? The...
Challenge Link: https://app.letsdefend.io/challenge/shellshock-attack Log file: /root/Desktop/ChallengeFile/shellshock.pcap Question 1 What is the server operating system? I opened the challenge ...
Challenge Link: https://app.letsdefend.io/challenge/investigate-web-attack Challenge File: /root/Desktop/ChallengeFile/access.log Question 1 Which automated scan tool did attacker use for web reco...
Challenge Link: https://app.letsdefend.io/challenge/Malicious-VBA Malicious Macro: /root/Desktop/ChallengeFiles/invoice.vb Question 1 The document initiates the download of a payload after the ex...
Challenge Link: https://app.letsdefend.io/challenge/remote-working File link: /root/Desktop/ChallengeFiles/ORDER_SHEET_SPEC.zip Password: infected Question 1 What is the date the file was created?...
Challenge Link: https://app.letsdefend.io/challenge/Presentation-As-a-Malware File link: /root/Desktop/ChallengeFiles/PO00187.zip Password: infected Question 1 What was the general name / category...
Challenge Link: https://app.letsdefend.io/challenge/malicious-doic Question 1 What type of exploit is running as a result of the relevant file running on the victim machine? My first move after u...
Challenge Link: https://app.letsdefend.io/challenge/linux-forensics Scenario: An ex-employee, who appears to hold a grudge against their former boss, is displaying suspicious behavior. We seek as...