Instructions:
- Uncompress the challenge (pass: cyberdefenders.org)
Scenario
The enterprise EDR alerted for possible exfiltration attempts originating from a developer RedHat Linux machine. A fellow SOC analyst captured a disk image for the suspected machine and sent it for you to analyze and identify the attacker's footprints.
Tools