As the Red Team, you will attack a vulnerable VM within your environment, ultimately gaining root access to the machine. As Blue Team, you will use Kibana to review logs taken during their Day 1 engagement. You'll use the logs to extract hard data and visualizations for an assessment report. The log data will be interpreted in order to suggest m…
-
Updated
Dec 14, 2021