Write-Host “Post-Breech Exercise”
Ever wanted to go through a “simulated” post-data breech to see how well you would be able to handle it? MiSec has posted the files from the Network Forensic Challenge from this year’s GrrCON. It’s also a great crash course on the Volatility memory dump tool and how to use to it help identify the type of attack and the malicious means used to compromise the system. You can find the Live Distro iso and the files HERE. The “solution” can be found HERE.