Challenge: For the Rebellion or the Empire
This challenge will have you analyze traditional Registry artifacts to identify unauthorized activity. The goal is to see from a blue teamer's point of view the actions an unauthorized user may take on a victim's system when there are inadequate security controls in place.
Already have an account? Sign In »

Module 1: Investigate
Blue Team POV: System Analysis
In this weekly challenge, you will analyze standard Windows Registry files for a possible insider threat. This challenge aims to look beyond the basics of registry analysis by focusing on the attack timeline and piecing together the attacker's movement to create a picture of precisely what happened.
Who is this for:
Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge is relatively low. We encourage using any internet resources and community/colleague assistance in completing the challenge.
Are write-ups permitted?
Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.
What resources are available to help solve this challenge?:
Online search, community, colleagues, or fellow practitioners.

Marc Balingit
Security Researcher - Incident Response


Complete this entire course to earn a Challenge: For the Rebellion or the Empire Certificate of Completion