- Stay within resource usage requirements.
- Do not engage in or encourage activity that is illegal.
- Do not engage in cryptocurrency mining.
Ready for the real environment experience?
This lab is the second in a series of three labs where you will be performing forensic analysis in a cloud environment that has fallen victim to an attack. Each lab in the series is in increasing level of difficulty:
- Cloud Incident Response & Forensics: Introductory Lab
- Cloud Incident Response & Forensics: Foundation Lab
- Cloud Incident Response & Forensics: Intermediate Lab
In this lab, the second in the series, you will be performing further incident response and forensic analysis to determine what the attacker did within the container. Specifically, you will further build upon the log analysis skills they developed in the first lab. You will then perform further research on the specific tools used by the attacker, further developing your information gathering skills. Finally, you will perform some interim analysis to consolidate your understanding of what has transpired to prepare you for the final lab.
Upon completion of this lab you will be able to:
- Determine what the attacker did once they gained access to the container’s Command Line Interface
- Use information gathering skills to research specific tools used by the attacker
- Generate interim analysis to bring together a picture of the attack so-far
This lab is intended for:
- Cybersecurity practitioners
- Individuals interested in container, web, and Linux security
You should be familiar with:
- Working at the command line in Linux
- Docker container technology and Docker commands
- The Cloud Incident Response & Forensics: Introductory Lab should be completed before attempting this lab
Tiarnan is a CyberFirst bursary student, working with QA as a cyber security researcher, who joined QA after successfully completing a summer placement. He is currently studying for his computer science degree at Nottingham University.