Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Windows Threat Detection 3

Premium room

Learn how threat actors manage to maintain access to the breached Windows hosts.

medium

60 min

10,324

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

What if attackers aren't satisfied with just breaching the host but aim to stay, establish control, and use the system as a starting point for future operations? This room completes your Windows threat detection journey and explores how a compromised host can become part of a larger attack, focusing on three tactics: Command and Control, , and Impact.

Learning Objectives

  • Remind the concept of Command and Control ()
  • Learn why and how threat actors maintain control of their victims
  • Use Windows event logs to uncover various methods
  • See how the learned techniques work in a hands-on environment

Prerequisites

Lab Access

Before moving forward, start the lab by clicking the Start Machine button below. The will open in split view and will need about 2 minutes to fully load. In case the is not visible, you can click the Show Split View button at the top of the page.

Set up your virtual environment

To successfully complete this room, you'll need to set up your virtual environment. This involves starting the Target Machine, ensuring you're equipped with the necessary tools and access to tackle the challenges ahead.
Target machine
Status:Off

Credentials

Alternatively, you can access the from your own -connected machine with the credentials below:

Username
 
Administrator
 
Password
 
Secure!
 
IP address
 
MACHINE_IP
 
Connection via
 
Answer the questions below

Let's go!

Ready to learn Cyber Security?

The Windows Threat Detection 3 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.