As a cybersecurity analyst at TechSecure Corp, you’re alerted to unusual activity within the company’s Active Directory environment. Initial reports indicate possible unauthorized access and privilege escalation attempts. Your mission is to analyze the provided logs to determine the extent of the attack, identify malicious actions, and secure the network.
This investigation focuses on identifying unauthorized access patterns, privilege escalations, and any lateral movement across the network. You have two primary data sources: triage event logs from three affected machines and a Splunk instance with the same logs for flexible querying. Your goal is to pinpoint the attacker’s activities and assess the scope of the compromise using either direct log analysis or analysis with Splunk queries,