This lab is the third in a series of three labs where you will be performing forensic analysis in a cloud environment that has fallen victim to an attack. Each lab in the series is in increasing level of difficulty:
In this lab, which is the third and final in the series, you will figure out what the attacker did in the host machine and generate a report which breaks down what happened. You will perform further Linux Log analysis which will finalise your development of this skill as introduced in the previous two labs. You will then perform Docker Log analysis, which will introduce you to this complex cloud-specific analysis technique. You will then be guided to write an Analysis Report, bringing together all of your findings and giving you the skills to perform complex analysis.
Upon completion of this lab you will be able to:
This lab is intended for:
You should be familiar with:
January 22nd, 2021 - Updated instructions to reflect the latest simulated attack environment
Tiarnan is a CyberFirst bursary student, working with QA as a cyber security researcher, who joined QA after successfully completing a summer placement. He is currently studying for his computer science degree at Nottingham University.