To access material, start machines and answer questions login.
Uncover the secrets of the new emerging threat, the Boogeyman.
In this room, you will be tasked to analyse the Tactics, Techniques, and Procedures (TTPs) executed by a threat group, from obtaining initial access until achieving its objective.

Prerequisites
This room may require the combined knowledge gained from the L1 Pathway. We recommend going through the following rooms before attempting this challenge.
Investigation Platform
Before we proceed, deploy the attached machine by clicking the Start Machine button in the upper-right-hand corner of the task. It may take up to 3-5 minutes to initialise the services.
The machine will start in a split-screen view. In case the is not visible, use the blue Show Split View button at the top-right of the page.
Artefacts
For the investigation proper, you will be provided with the following artefacts:
- Copy of the email (dump.eml)
- Logs from Julianne's workstation (.)
- Packet capture from the same workstation (capture.pcapng)
Note: The . file contains -formatted logs extracted from its original file via the evtx2json (opens in new tab) tool.
You may find these files in the /home/ubuntu/Desktop/artefacts directory.
Tools
The provided contains the following tools at your disposal:
- Thunderbird - a free and open-source cross-platform email client.
- LNKParse3 (opens in new tab) - a python package for forensics of a binary file with extension.
- Wireshark - -based packet analyser.
- Tshark - -based Wireshark.
- jq - a lightweight and flexible command-line processor.
To effectively parse and analyse the provided artefacts, you may also utilise built-in command-line tools such as:
- grep
- sed
- awk
- base64
Now, let's start hunting the Boogeyman!
Ready to learn Cyber Security?
The Boogeyman 1 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
