Forensic investigation challenges that test your ability to analyze compromised systems, trace attacker footprints, and uncover hidden artifacts. From memory dumps to network captures — piece together the full intrusion timeline and identify every IOCs.
Memory forensics investigation of an APT intrusion. Rootkit analysis, process reconstruction, and indicator extraction from a compromised Windows memory dump — tracing the full attack chain from initial access to persistence mechanisms.
Network forensics challenge involving PCAP analysis of a phishing campaign. Trace the attacker's initial vector through email artifact extraction, credential harvesting infrastructure, and lateral movement indicators across the compromised network.