SIMULATION
-
An organization’s website was maliciously altered.
INSTRUCTIONS
-
Review information in each tab to select the source IP the analyst should be concerned about, the indicator of compromise, and the two appropriate corrective actions.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
//IMG//
//IMG//
//IMG//
//IMG//
Case study scenario
Tabs include SFTP log, Netstat, and HTTP access. Analysts must investigate logs to determine the malicious source IP, identify indicators of compromise, and select two corrective actions.