Objectives
Practice Linux logging research and advanced forensics, gaining hands-on experience with Windows, MSSQL server, and Firewall Management, understanding attack logic, data obfuscation, and attacker objectives.
Scenario Overview
An unsuspecting user executes a Trojan horse, but is executed with user privileges and thus is limited. But the Trojan is able to escalate its privileges, and create a new administrative account. Using the new account, the Trojan breaks into the database server and uses it as a gateway to upload secret files to the organization’s website and causes a major public data leak.
Stock number:
6147761
Price:
$500.00