BlackEnergy Walkthrough — CyberdefendersScenario: A multinational corporation has been hit by a cyber attack that has led to the theft of sensitive data. The attack was carried…Apr 14, 2023Apr 14, 2023
HawkEye Walkthrough — CyberdefendersScenario: An accountant at your organization received an email regarding an invoice with a download link. Suspicious network traffic was…Mar 6, 20221Mar 6, 20221
DumpMe Walkthrough — CyberdefendersScenario: One of the SOC analysts took a memory dump from a machine infected with a meterpreter malware. As a Digital Forensicators, your…Jan 1, 2022Jan 1, 2022
Malware Traffic Analysis 1 Walkthrough — CyberdefendersChallenge Link: https://cyberdefenders.org/labs/17Dec 21, 2021Dec 21, 2021
Bucket Walkthrough — CyberdefendersScenario Welcome, Defender! As an incident responder, we’re granting you access to the AWS account called “Security” as an IAM user. This…Dec 15, 2021Dec 15, 2021