To access material, start machines and answer questions login.
In this room, as a team member, you were tasked with supporting a medium-sized company in its efforts to investigate and recover from a cyberattack in which threat actors cleared Windows Security logs and hoped to remain undetected.
The room is intended for team members and L2/L3 analysts who want to be better prepared during scenarios in which a cyberattack does not leave any obvious traces but still must be investigated using built-in tools and artifacts.
Learning Objectives
- Get acquainted with different Windows logs, some even more helpful than Security logs
- Investigate a realistic attack scenario, from web exploitation up to credential access
Prerequisites
Before moving on, it is recommended to be familiar with Windows , its logging capabilities and common attack techniques. Great rooms to start with:
Let's begin!
Ready to learn Cyber Security?
The Logless Hunt room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in