CDSA Preparation

By working through realistic defensive scenarios and hands-on challenges, participants will strengthen their ability to detect, analyze, and respond to security incidents with confidence.
Unit42
Very Easy
Using Sysmon logs / Windows event analysis / "backdoored UltraVNC" malware for persistence and initial access.
Recollection
Easy
Memory forensics analysis in Windows 7; obfuscated PowerShell; abandoned "passwords.txt" file; clipboard/history analysis.
RogueOne
Easy
Memory forensics; malicious process identification; C2; netscan analysis of dumps.
LogJammer
Easy
Log analysis (Security, System, Defender, Firewall, PowerShell); changes to firewall rules; scheduled tasks; log cleanup.
Trojan
Easy
Memory analysis with Volatility 3; malicious ZIP file; installation of recovery software; investigation of a compromised workstation.
Tracer
Easy
Use of PsExec lateral movement; Prefetch analysis; “PsExeSvc” service; execution counting; endpoint forensics
ReliableThreat
Medium
Exploitation of a malicious VSCode extension → reverse shell; COM hijack for persistence.
Jinkies
Medium
Investigation using “LiveResponse / TriageData” artifacts; analysis of folder sharing, use of process logs/registry; OSINT element.
Detroit Becomes Human
Hard
Malware via social-media link → execution of malicious installer → staging in “C:\Program Files (x86)\Google\Install\” → script execution → forensic analysis of event logs and PowerShell.
Streamer
Hard
-—
--—
Last updated