- Category: forensics
- Difficulty: beginner
- Author: TurboPenguin
- Tags:
Looks like the attacker managed to access the rebels Domain Controller.
Can you figure out how they got access after pulling these artifacts from one of our Outpost machines?
Name | Name | Last commit date | ||
---|---|---|---|---|
parent directory.. | ||||
Looks like the attacker managed to access the rebels Domain Controller.
Can you figure out how they got access after pulling these artifacts from one of our Outpost machines?