Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Logless Hunt

Premium room

Detect every attack step on a Windows machine even after threat actors cleared Security logs.

medium

90 min

4,188

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

In this room, as a team member, you were tasked with supporting a medium-sized company in its efforts to investigate and recover from a cyberattack in which threat actors cleared Windows Security logs and hoped to remain undetected.

The room is intended for team members and L2/L3 analysts who want to be better prepared during scenarios in which a cyberattack does not leave any obvious traces but still must be investigated using built-in tools and artifacts.

Learning Objectives

  • Get acquainted with different Windows logs, some even more helpful than Security logs
  • Investigate a realistic attack scenario, from web exploitation up to credential access

Prerequisites

Before moving on, it is recommended to be familiar with Windows , its logging capabilities and common attack techniques. Great rooms to start with:

Notice: This room includes both guided walkthroughs along with independent challenges that rely on knowledge gained in other rooms. Prepare for both!
Answer the questions below

Let's begin!

Ready to learn Cyber Security?

The Logless Hunt room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.