In this exercise, you will be required to use your Windows forensics skills to analyze security alerts and determine their origin. Identify and determine who` s behind the malicious activity – understand the attacker lateral movement techniques, persistency method, and main goal. When needed, respond to the malicious activity to prevent the attacker from spreading or maintaining access to your organizations network.
In this exercise, you will be required to use your Windows forensics skills to analyze security alerts and determine their origin. Identify and determine who` s behind the malicious activity – understand the attacker lateral movement techniques, persistency method, and main goal. When needed, respond to the malicious activity to prevent the attacker from spreading or maintaining access to your organizations network.