Task 1Introduction
Task includes a deployable machine
Task 2Preparation - Log Analysis
Task 3Preparation - Tools and Artifacts
Task 4Initial Access - Malicious Document
Task 5Initial Access - Stage 2 execution
Task 6Initial Access - Malicious Document Traffic
Task 7Discovery - Internal Reconnaissance
Task 8Privilege Escalation - Exploiting Privileges
Task 9Actions on Objective - Fully-owned Machine
Ready to learn Cyber Security?
The Tempest room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in

