Blue Team Scenario Shanghai
Rated 3.5/5 based on 11 customer reviews

Blue Team Scenario Shanghai

Available: Out of Stock
$1,050.00

Request Info

The collection phase of an attack consists of different techniques adversaries may use to gather information.

In this exercise, you will be required to identify how the attacker managed to quietly get into the organization and manipulate tools to spread itself and maintain persistence, as well as the collection technique used to exfiltrate sensitive data. Upon successful identification, you will need to undo the changes made by the attacker on the network in order to remove the threat.

The collection phase of an attack consists of different techniques adversaries may use to gather information.

In this exercise, you will be required to identify how the attacker managed to quietly get into the organization and manipulate tools to spread itself and maintain persistence, as well as the collection technique used to exfiltrate sensitive data. Upon successful identification, you will need to undo the changes made by the attacker on the network in order to remove the threat.