Free
Challenge: Malware in a Haystack
This challenge will have you hunting for evidence of persistence, a tactic that threat actors commonly use to maintain a foothold within a compromised environment. The goal is to find the needle in the haystack to determine abnormal versus normal system behavior.
1
H
0
M
Time
beginner
difficulty
1
ceu/cpe
Course Content
No items found.
Course Description
Blue Team POV: Registry Analysis
>In this challenge, you will be hunting for evidence of persistence, which allows attackers to keep discrete long-term access to systems regardless of system restarts or credential changes. This challenge aims to showcase the impact of threat actor tactics by putting on the shoes of an analyst sifting through numerous amounts of data to find evidence of malicious activities.![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)