Network Investigation - Walkthrough
You are a cybersecurity analyst working for a company that hosts customer web applications using KVM-based virtual machines. Over the weekend, one of the production VMs unexpectedly went offline. The web application team suspects this outage was caused by malicious activity. As part of the incident response process, they’ve provided you with a set of extracted evidence from the affected environment — including network captures, system logs, and possible malware samples.
By CyberTask Engineer · Easy level
15
Tasks
1
Sections
451
Points
1 hr
Duration
What You'll Learn
- Follow a guided walkthrough of network forensics investigation techniques
- Learn to extract credentials, identify malware, and trace persistence mechanisms
- Analyze kernel modules, hidden processes, and C2 communication patterns
Prerequisites
- Basic networking knowledge
- Understanding of Linux systems
Tools & Technologies
Wireshark
John the Ripper
Linux CLI
Strings
File Analysis Tools
Ready to Begin?
Sign in or create an account to start this lab and earn points.