To access material, start machines and answer questions login.
Due to the previous attacks of Boogeyman, Quick Logistics LLC hired a managed security service provider to handle its Security Operations Center. Little did they know, the Boogeyman was still lurking and waiting for the right moment to return.
In this room, you will be tasked to analyse the new tactics, techniques, and procedures (TTPs) of the threat group named Boogeyman.
Prerequisites
This room may require the combined knowledge gained from the L1 Path. We recommend going through the following rooms before attempting this challenge.
Investigation Platform
Before we proceed, deploy the attached machine by clicking the Start Machine button in the upper-right-hand corner of the task. The provided virtual machine runs an Elastic Stack (), which contains the logs that will be used throughout the room.
Once the machine is up, access the console (via the AttackBox or ) using the credentials below.

| URL | ://MACHINE_IP |
| Username | elastic |
| Password | elastic |
Note: The instance may take 3-5 minutes to initialise.
Let's end this Boogeyman incident!
Ready to learn Cyber Security?
The Boogeyman 3 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
