This exercise encompasses a wide range of sophisticated attack techniques for persistence, lateral movement and defense evasion. To successfully solve this exercise, you must demonstrate a broad spectrum of skills such as advanced Windows and network forensic techniques, usage of different analysis tools such as SysInternals and reverse engineering of malicious files.
This exercise encompasses a wide range of sophisticated attack techniques for persistence, lateral movement and defense evasion. To successfully solve this exercise, you must demonstrate a broad spectrum of skills such as advanced Windows and network forensic techniques, usage of different analysis tools such as SysInternals and reverse engineering of malicious files.