This scenario begins with a phishing attack where an unsuspecting employee receives an Trojan-infected email for a legitimate source. The Trojan is executed with user privileges, motivating the attacker to determine a path to privilege escalation. In this complex attack, participants will use advanced detection and prevention techniques to mitigate the scenario before significant data is exfiltrated from the environment.
Training Mission: Trojan Share PE
20-02-2020 @ 12:00 pm - 2:00 pm
One event on 20-02-2020 at 12:00 pm
One event on 26-03-2020 at 12:00 pm