Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
The organization 4Geeks Academy has detected anomalous behavior on one of its internal servers. The cybersecurity team has been activated to contain the threat, identify the scope of the incident, and restore the system's security.
You will assume the role of a Cybersecurity Analyst, responsible for:
1https:/cybersecurity-machines/4geeks-server-lab.ova
1usuario: sysadmin 2contraseña: Sys4dm1n2024
Since the affected server is part of a critical production system, it cannot be shut down or have its disk extracted for traditional forensic analysis. Therefore, your task will focus on a Live Incident Response approach, meaning direct inspection on an active system. This is because:
📘 To guide you in this phase, you can consult the Incident Investigation Guide for Blue Team Analysts, which details key commands, technical reasoning, and best practices.
Remove any trace of the attacker, restore the server to a secure state, and strengthen its security configuration.
During this phase you should:
Justify every action you take. Your reasoning and evidence will be as important as your technical actions.
Prepare a single, comprehensive report that includes:
This report should demonstrate your technical reasoning, clarity in documentation, and ability to respond to real incidents.
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis
Difficulty
intermediate
Average duration
3 hrs
Technologies
cybersecurity
incident response
linux security
live forensics
network analysis