Skip to main contentSkip to main content
The Red Raffle banner icon.

The Jr Pentester Path just got rebuilt. Complete rooms, earn tickets, and win a free PT1 cert.

Room Banner
Room Icon

Shock and Silence

Premium room

Investigate the fifth, File System part of the Honeynet Collapse!

hard

60 min

970

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Meet DeceptiTech

DeceptiTech is a fast-growing cyber security company specializing in development and deception technologies. At the heart of their success are DeceptiPots - lightweight, powerful, and configurable honeypots that you can install on any and capture every malicious action!

The internal DeceptiTech network is organized around a traditional on-premises Active Directory domain with approximately 50 active users. The product platform, however, is isolated and hosted entirely in the cloud:

A diagram of the DeceptiTech network

Initial Access Pot

One ordinary morning, DeceptiTech's entire network collapsed. Within minutes, all critical on-premises systems were locked down and encrypted. The IT department hurried to restore backups, while the security team rushed to their - only to find the backups corrupted and all data wiped clean.

This room is about the fifth attack stage (#5 on the network diagram). As a part of an external unit, can you help DeceptiTech to perform a full-scope investigation?

Answer the questions below

Let's go!