🐒Monkey Money Challenge
https://app.malizen.com

1️⃣ - Contexte du challenge
2️⃣ - Contexte du lab
Here's what you need to know

3️⃣ - Challenge
On a quoi à notre disposition ?
Exemple key:value linux
Exemple key:value windows
Début des recherches

Catégorie
Sous-catégorie
Artefacts
Command and Control - Log4j exploit to gain access to the webserver
Ingress tool transfer


Execution & Ressource Development - Obtaining access to other machines
Command and scripting Interpreter


Acquire Infrastructure

Stage Capabilities

Discovery - Exploring the network, machines, files, users
Hosts
IP
Files
Datetime

IP DST
Request
Commentaire



Credential Access & Lateral Movement - Moving from victim to victim using secrets
OS credential dumping


Exploitation of remote services

Lateral Movement - Moving to the final target
Remote services - Windows remote management

Impact - Launching the final attack: the ransomwae
Data encrypted for impact


Mis à jour

