As the Red Team, you will attack a vulnerable VM within your environment, ultimately gaining root access to the machine. As Blue Team, you will use Kibana to review logs taken during their Day 1 engagement. You'll use the logs to extract hard data and visualizations for an assessment report. The log data will be interpreted in order to suggest m…
documentation
kibana
communication
filebeat
reporting
configuration
penetration-testing
metricbeat
packetbeat
kali-linux
system-hardening
incident-analysis
-
Updated
Dec 14, 2021