Challenge: Spiny Shell
You receive an alert about a suspicious command execution on a Windows endpoint. Early analysis suggests PowerShell has not locked down appropriately. Can you validate if anything malicious is underway? Now that you have some basic information discovered, dive deeper into the suspicious command to identify the attacker’s infrastructure and setup!
Course Description
In this weekly challenge, you will operate in a defensive capacity to investigate this exact scenario:
Module 1: Defense
User Reviews
Be the first to review “Challenge: Spiny Shell”
You must be logged in to post a review.
×


There are no reviews yet.