hands-on lab

Cloud Incident Response & Forensics: Intermediate Lab

Difficulty: Intermediate
Duration: Up to 1 hour and 10 minutes
Students: 548
Rating: 4.7/5
Get guided in a real environmentPractice with a step-by-step scenario in a real, provisioned environment.
Learn and validateUse validations to check your solutions every step of the way.
See resultsTrack your knowledge and monitor your progress.

Description

This lab is the third in a series of three labs where you will be performing forensic analysis in a cloud environment that has fallen victim to an attack. Each lab in the series is in increasing level of difficulty:

  1. Cloud Incident Response & Forensics: Introductory Lab
  2. Cloud Incident Response & Forensics: Foundation Lab
  3. Cloud Incident Response & Forensics: Intermediate Lab

In this lab, which is the third and final in the series, you will figure out what the attacker did in the host machine and generate a report which breaks down what happened. You will perform further Linux Log analysis which will finalise your development of this skill as introduced in the previous two labs. You will then perform Docker Log analysis, which will introduce you to this complex cloud-specific analysis technique. You will then be guided to write an Analysis Report, bringing together all of your findings and giving you the skills to perform complex analysis.

Learning Objectives

Upon completion of this lab you will be able to:

  • Determine what the attacker did on the host machine once they broke out of the container
  • Write analysis reports to detail findings from forensic analysis

Intended Audience

This lab is intended for:

  • Cybersecurity practitioners
  • Individuals interested in container, web, and Linux security

Prerequisites

You should be familiar with:

Updates

January 22nd, 2021 - Updated instructions to reflect the latest simulated attack environment

Covered topics

Lab steps

Logging in to the Microsoft Azure Portal
Connecting to the Attack Victim Machine Using RDP
Part 1: Linux Log Analysis
Part 2: Docker Log Analysis
Part 3: Forensic Analysis Report