Scenario and Instructions
Last updated
Last updated
Compatibility: VirtualBox
Uncompress the lab (pass: cyberdefenders.org)
Zip SHA1: 7d2e0b18bc11e9987431369b180577886d956b0a
Zip size: 20 GB
Make sure you have a host-only subnet within the following IP range 192.168.20.0/24.
Assign the proper network adapter (192.168.20.0/24) to the VM before starting it.
Wait for some minutes after the import completes then visit: .
Challenge credentials: QRadar Dashboard: admin:Admin@123 - SSH: root:cyberdefenders
In case you face a license issue, please go to > License Pool Management. Edit and set eps > 0 and edit the FPM and set it to 0. This will ensure you will not have a license problem.
Hardware Requirements: 8GB of memory and 65GB of disk space.
A financial company was compromised, and they are looking for a security analyst to help them investigate the incident. The company suspects that an insider helped the attacker get into the network, but they have no evidence.
The initial analysis performed by the company's team showed that many systems were compromised. Also, alerts indicate the use of well-known malicious tools in the network. As a SOC analyst, you are assigned to investigate the incident using QRadar SIEM and reconstruct the events carried out by the attacker.
Sysmon - swift on security configuration
PowerShell logging
Windows Eventlog
Suricata IDS
Zeek logs (conn, HTTP)
After starting the QRadar virtual machine, begin the investigation by accessing the QRadar web console through the following URL:
💡 Before starting the investigation this video explains how to run the machine and prepare the environment for the analysis. 📺 A full setup and walkthrough guide is available here:
🔗