Admin, Labs

New lab

Windows Logon Anomaly Triage

Intro Defensive Investigation
Edit

PowerShell Execution Review

Intro Defensive Investigation
Edit

Webshell Hunting Intro

Intro Defensive Investigation
Edit

Host Discovery Basics

Nmap Fundamentals
Edit

Turning Scan Output into Findings

Nmap Fundamentals
Edit

Top Ports and Service Detection

Nmap Fundamentals
Edit

Version Detection and Default Scripts

Nmap Fundamentals
Edit

Map a Small Web Attack Surface

Nmap Fundamentals
Edit

Attachment Review Without Detonation

SOC Analyst – Phishing Email Investigation
Edit

BEC Wire Fraud Attempt

SOC Analyst – Phishing Email Investigation
Edit

Suspicious Invoice Header Triage

SOC Analyst – Phishing Email Investigation
Edit

Link Inspection and Redirect Hunt

SOC Analyst – Phishing Email Investigation
Edit

Microsoft 365 Credential Harvest

SOC Analyst – Phishing Email Investigation
Edit

DNS Beaconing Clues

Wireshark Fundamentals
Edit

Simple Exfiltration Over HTTP

Wireshark Fundamentals
Edit

HTTP Credentials in Cleartext

Wireshark Fundamentals
Edit

SMB Lateral Movement Clues

Wireshark Fundamentals
Edit

TLS Handshake Basics

Wireshark Fundamentals
Edit