You’ve signed up for the workshop, you've studied to the data, and you've even gotten your hands dirty. Now is the time to put your knowledge to the ultimate test!
The data you've been provided during the workshop contains several exfiltration examples that you have had a chance to observe and hunt for. However, there also exists ANOTHER form of exfiltration that your instructor touched on. It is up to you to take what you have learnt throughout this workshop and apply it to discover the other exfiltration mechanism, as well as answer some questions.
For those that successfully answer the questions, you will be awarded the Cyborg Security Threat Hunting badge for Exfiltration (Level 1).
How Do You Claim Your Badge?
The data is already imported into your Elastic instance during set up - all you have to do is begin your hunt!
HINT: Remember, whether you attended LIVE or RECORDED sessions, your instructor gave you a hint during the course. Use that hint to begin your hunt!
REMEMBER: You can submit as many times as you like!
Lee Archinal
Senior Threat Hunter and Content Developer, Cyborg Security