Red Team Tools

We saw a post about our company's data being put up for sale in a hacking forum. It says "I love you Anderson" at the end of the post

We know that an attacker leaked data from inside the organization and have no idea how the incident happened.As a incident responder, you need to find out how this incident happened and its root cause.

Fortunately, we collect useful logs. You can use "Log Management", "Endpoint Security" and "Threat Intel" pages for solving this case. We think these logs are enough for finding root cause.

Good Luck!


Walkthroughs:

  • DFIR - Red Team Tools