PHASE: Capstone Challenge50% COMPLETION
MODULE 20
The Hunter's Capstone
Full-spectrum hunt in a simulated compromised enterprise environment.
Capstone Challenge
Enterprise Compromise Hunt
You are a threat hunter at a Fortune 500 company. The SOC has detected suspicious activity but cannot determine the scope of the breach.
Your Mission: Hunt through Windows logs, network traffic, and memory dumps to identify the attack chain, persistence mechanisms, and data exfiltration attempts.