Clone
Windows event log analysis
Description
Solution
./dumpevtx parse /path/to/Microsoft-Windows-Sysmon%4Operational.evtx | tee sysmon.txt1. What is the email of the attacker used for the exfiltration process? (for example: name@email.com)

2. What is the password of the attacker used for the exfiltration process?


3. What is the Cloud storage provider used by the attacker?
4. What is the ID of the process used by the attackers to configure their tool?

5. What is the name of the folder the attacker exfiltrated; provide the full path. (format: C:/path/to/folder/)

6. What is the name of the folder the attacker exfiltrated the files to?

Flag
Resources
Last updated