Free

Challenge: Malware in a Haystack

This challenge will have you hunting for evidence of persistence, a tactic that threat actors commonly use to maintain a foothold within a compromised environment. The goal is to find the needle in the haystack to determine abnormal versus normal system behavior.
1
0
M
Time
beginner
difficulty
1
ceu/cpe

Course Content

The Impact of Threat Actor Tactics

0m

Hunt Evidence of Persistence
Course Description

Blue Team POV: Registry Analysis

>In this challenge, you will be hunting for evidence of persistence, which allows attackers to keep discrete long-term access to systems regardless of system restarts or credential changes. This challenge aims to showcase the impact of threat actor tactics by putting on the shoes of an analyst sifting through numerous amounts of data to find evidence of malicious activities.

![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)

Who is this for:

>Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge is relatively low. We encourage using any internet resources and community/colleague assistance in completing the challenge.

Are write-ups permitted?

>Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.

What resources are available to help solve this challenge?:

>Online search, community, colleagues, or fellow practitioners.

This course is part of a Career Path:
No items found.

Instructed by

Master Instructor
Marc Balingit

Marc has led, managed, and performed global incident response investigations focused on large-scale data breaches, system compromises, data exfiltration, ransomware, and malware outbreaks. He has worn many hats throughout his Incident Response career, including proactive and reactive services. Outside Blue Teaming, Marc is passionate about Vulnerability Research and Malware Analysis. He is a Technical SME at Cybrary, focusing on Threat Actors and Blue Teaming for course content.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Challenge: Malware in a Haystack Certificate of Completion