Room progress ( 0% )
Task 1Introduction
Task includes a deployable machine
Task 2Preparation - Log Analysis
Task 3Preparation - Tools and Artifacts
Task 4Initial Access - Malicious Document
Task 5Initial Access - Stage 2 execution
Task 6Initial Access - Malicious Document Traffic
Task 7Discovery - Internal Reconnaissance
Task 8Privilege Escalation - Exploiting Privileges
Task 9Actions on Objective - Fully-owned Machine
Ready to learn Cyber Security? Create your free account today!
The Tempest room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in