Free
Challenge: For the Rebellion or the Empire
This challenge will have you analyze traditional Registry artifacts to identify unauthorized activity. The goal is to see from a blue teamer's point of view the actions an unauthorized user may take on a victim's system when there are inadequate security controls in place.
1
H
0
M
Time
beginner
difficulty
1
ceu/cpe
Course Content
The Importance of Security Controls
Investigate
Course Description
Blue Team POV: System Analysis
> In this challenge, you will analyze standard Windows Registry files for a possible insider threat. This challenge aims to look beyond the basics of registry analysis by focusing on the attack timeline and piecing together the attacker's movement to create a picture of precisely what happened.![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)