Free
Challenge: For the Rebellion or the Empire
This challenge will have you analyze traditional Registry artifacts to identify unauthorized activity. The goal is to see from a blue teamer's point of view the actions an unauthorized user may take on a victim's system when there are inadequate security controls in place.

1
H
0
M
Time
beginner
difficulty
1
ceu/cpe
Course Content
No items found.
Course Description
Blue Team POV: System Analysis
> In this challenge, you will analyze standard Windows Registry files for a possible insider threat. This challenge aims to look beyond the basics of registry analysis by focusing on the attack timeline and piecing together the attacker's movement to create a picture of precisely what happened.