
Kerberoasting: Service Ticket to Domain Admin
Analyze a high-speed identity-based attack where an adversary pivots from a VPN compromise to Active Directory dominance in under 4 hours. This scenario focuses on detecting Kerberoasting (T1558.003) via service ticket anomalies and tracking the rapid escalation to Domain Admin privileges.
Start this operation
Requires a Pro subscription.
View Pro PlansFree forever — no credit card required
Investigation Tasks
Complete each task by investigating alerts and submitting your findings.
Mapping the Adversary Tactic
40During the analysis of the incident occurring at 2025-01-11T21:12:00Z, the attacker executed a series of commands aimed at harvesting sensitive information from the system. You need to examine the XDR detection metadata to determine which high-level attack phase this activity falls under according to the MITRE framework.
Identifying Golden Ticket Persistence
50After an initial breach, the adversary attempted to maintain long-term access by targeting the Kerberos Ticket Granting Service. You need to analyze the security events in the XDR panel to determine the exact sub-technique used to forge authentication tickets.
Mapping the Adversary's Cloud Strategy
50The security console flagged an unusual sequence of API calls occurring at 2025-01-12T04:15:33Z. You must investigate the XDR panel to determine which specific MITRE technique was mapped to this behavior, as it indicates the attacker is targeting specific geographical configurations.
Identifying Suspicious External Connections
15Our monitoring system flagged an unusual network event originating from an internal host. You need to investigate the telemetry data to determine which remote destination the system attempted to communicate with during the final stages of the recorded activity.
Mapping the Adversary's Methodology
50The initial alert indicates that an attacker may have attempted to manipulate the environment to maintain access. Review the telemetry around 04:15:33Z to determine which specific sub-technique or technique was mapped to this activity by the detection engine.
Identifying Adversary Tactic in XDR Alerts
40An alert was triggered indicating that an adversary attempted to bypass security controls on a workstation. You need to analyze the alert details in the XDR panel to determine which high-level MITRE tactic describes the phase of the attack where the threat actor tries to avoid detection.
Investigating Persistence via Kerberos Ticket Manipulation
50An alert was triggered indicating that an adversary may have compromised the Key Distribution Center (KDC) service account. Review the XDR panel to determine the exact name of the technique used to maintain long-term persistence within the domain.
Identifying Suspicious Domain Communication
15Evidence suggests that after initial access on 2025-01-10T10:29:50.927Z, the attacker attempted to communicate with a specific internal domain. Locate the endpoint entry in the XDR event logs to identify which domain was being targeted during this phase of the attack.
8 tasks · 310 points total
Start investigationTraining Tools
Skills You'll Build
Requires foundational alert triage skills. Multiple data sources to correlate.
Prerequisites
- Basic understanding of security alerts
- Familiarity with SIEM concepts
- Familiarity with XDR concepts
Ready to investigate?
This operation requires a Pro subscription.
View Pro PlansFree forever — no credit card required
More Operations
View allClickFix: The Fake CAPTCHA Trap
Investigate a modern 'ClickFix' social engineering attack where a user was tricked into executing a malicious PowerShell command via a fake CAPTCHA interface. You will analyze SIEM and XDR telemetry to trace the infection from the initial web lure to the deployment of an infostealer.
Phishing Investigation: ZipLine Supply Chain Campaign
Investigate a sophisticated social engineering campaign targeting manufacturing supply chains. You will analyze a 'reversed' phishing flow where attackers use 'Contact Us' forms to trick employees into initiating email conversations, leading to the deployment of the custom MixShell in-memory implant via DNS tunneling.
Credential Harvesting: The Lookalike Login
An investigation into a modern phishing campaign targeting critical infrastructure. You will analyze email headers for domain spoofing, identify 'Paste and Run' execution chains, and track the delivery of the LummaC2 information stealer through SIEM logs.