Room Banner

Stolen Mount

Premium room

Analyse network traffic related to an unauthenticated file share access attempt, focusing on potential signs of data exfiltration.

easy

30 min

Room progress ( NaN% )

Room Type

Only subscribers can deploy virtual machines in this room! Go to your profile page to subscribe (if you have not already).

Users in Room

2,768

Created

40 days ago

Ready to learn Cyber Security? Create your free account today!

The Stolen Mount room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information contact us.

Read more