Elastic Stack Lab
easy
17 tasks
1 hour
Investigating a Real-World Security Breach - Blue Team
Test your Blue Team analysis skills by uncovering the details of a stealthy network intrusion using the Elastic Stack. Demonstrate your expertise in threat detection, log analysis, and incident response
List of tasks
- Tasks
- Overview
- Identify the Source IP of the Attack
- Identify the Attacked Username
- Identify the Attacked Host
- Count Failed Auth Attempts
- Last Failed Login Attempt Time
- Successful Login Time
- MITRE ATT&CK Technique ID
- Investigating First Command Executed by the Attacker
- Tool Used to Retrieve the Exploit
- Name of the File Created with vim
- Identify Exploit File
- Log ID of Exploit Execution
- Identify Reverse Shell Parameter
- Reverse Shell Destination IP Address
- Log ID Showing Access to passwd File
- Users Created by the Attacker