SIMULATION
-
An organization has noticed large amounts of data are being sent out of its network. An analyst is identifying the cause of the data exfiltration.
INSTRUCTIONS
-
Select the command that generated the output in tabs 1 and 2.
Review the output text in all tabs and identify the file responsible for the malicious behavior.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Popeyes_Chicken
1 month, 2 weeks agoJunkyJunk
1 week, 3 days agofab34
3 weeks, 5 days ago