You’ve signed up for the workshop, you've studied to the data, and you've even gotten your hands dirty. Now is the time to put your knowledge to the ultimate test!
The data you've been provided during the workshop contains several command and control examples that you have had a chance to observe and hunt for. In the data there exists another technique that falls under initial access. Hunt through the data and see if you can find it!
For those that successfully answer the questions, you will be awarded the Cyborg Security Threat Hunting badge for Command and Control (Level 1).
How Do You Claim Your Badge?
The data is already imported into your Elastic instance during set up - all you have to do is begin your hunt!
REMEMBER: You can submit as many times as you like!
Lee Archinal
Senior Threat Hunter and Content Developer, Intel 471
Jorge Rodriguez
Director of Malware, Intel 471