Blue Team Scenario Tokyo
Discover a series of security flaws in the implementation of your environment that enabled an attacker to gain access to internal systems, extract privileged information and interfere with business processes.
In this exercise, you will experience how various "simple" misconfigurations can be used by an experienced attacker to impact business operations.
Discover a series of security flaws in the implementation of your environment that enabled an attacker to gain access to internal systems, extract privileged information and interfere with business processes.
In this exercise, you will experience how various "simple" misconfigurations can be used by an experienced attacker to impact business operations.