Blue Team Scenario Buenos Aires
In this exercise, you will face one of OWASPs top threats, which allow an attacker to exfiltrate very sensitive data from your organization. You will need to identify the suspicious activity in your network, the malicious scripts used by the attacker for exfiltration, and to respond to the activity to prevent a complete catastrophe.
In this exercise, you will face one of OWASPs top threats, which allow an attacker to exfiltrate very sensitive data from your organization. You will need to identify the suspicious activity in your network, the malicious scripts used by the attacker for exfiltration, and to respond to the activity to prevent a complete catastrophe.