Blue Team Scenario Cairo
Rated 3.5/5 based on 11 customer reviews

Blue Team Scenario Cairo

Available: Out of Stock
$1,250.00

Request Info

If it looks like a duck, swims like a duck, and quacks like a duck, then it probably is a duck. Or maybe not?

In this exercise, using Linux logging research as well as network and web forensics you will be required to reconstruct the entire attack flow – from understanding the sophisticated infection vector to the damage caused to your organization. After understanding the attacker modus operandi, you will need take active actions to stop the attack and suggest measures to prevent such attack in the future.

If it looks like a duck, swims like a duck, and quacks like a duck, then it probably is a duck. Or maybe not?

In this exercise, using Linux logging research as well as network and web forensics you will be required to reconstruct the entire attack flow – from understanding the sophisticated infection vector to the damage caused to your organization. After understanding the attacker modus operandi, you will need take active actions to stop the attack and suggest measures to prevent such attack in the future.