Skip to main content
LOTL Campaign: Blending Into Admin Activity operation cover
IntermediateSIEMXDR

LOTL Campaign: Blending Into Admin Activity

In 2025, 79% of initial access is malware-free. This training scenario challenges analysts to identify sophisticated 'Living off the Land' (LotL) techniques where attackers use legitimate administrative tools like ntdsutil, netsh, and PowerShell to blend into normal network traffic. You will investigate a campaign targeting a manufacturing firm's Active Directory infrastructure, focusing on identity-based threats that have seen an 850% increase year-over-year.

45m
8 tasks
315 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Investigating Scripting Behavior on wkstn-prod-01

35

An alert was triggered for an unusual process execution on wkstn-prod-01 involving user jsmith. Review the XDR telemetry to determine which specific PowerShell-related technique was mapped to this malicious activity.

SOC{...}Hint available
2

Identify the Telemetry Source for Host wkstn-prod-01

50

An alert was triggered for an unusual process execution on wkstn-prod-01 involving the user jsmith. To properly validate the integrity of our forensic data, you must identify the exact log source that provided the granular event details for this workstation during the incident.

SOC{...}Hint available
3

Investigating Anomalous Outbound Traffic from srv-app-prod

50

Our monitoring system flagged an unusual connection originating from srv-app-prod that bypassed the standard proxy. You need to determine which network port was utilized for this specific external communication to assess if it was a standard service or a potential command-and-control channel.

SOC{...}Hint available
4

Investigating Service Installation on Domain Controller

50

An alert was triggered indicating potential lateral movement to the ad-server-01 host. You need to analyze the security logs to determine which event record confirms the registration of a new system service during the incident window.

SOC{...}Hint available
5

Identifying the Primary Log Source

50

During the timeline reconstruction of the initial breach, we observed a suspicious outbound request originating from the workstation assigned to jsmith. You need to examine the SIEM event details to determine which intermediary security component captured this traffic log.

SOC{...}Hint available
6

Identifying Lateral Movement Techniques

50

An alert was triggered indicating that an external source bypassed standard authentication on wkstn-prod-01. You need to investigate the XDR behavioral detections to determine which specific remote service was exploited for this lateral movement.

SOC{...}Hint available
7

Investigating Unauthorized Lateral Movement

15

Around 2025-04-30T07:59:54.956Z, an unusual process was initiated on a production workstation. You need to analyze the telemetry to determine which local user account was responsible for triggering this activity.

SOC{...}Hint available
8

Investigating Outbound Network Communication

15

At 2025-05-15T01:29:54.692Z, an unusual connection was initiated from a production workstation to an external endpoint. Review the SIEM content to determine which specific domain was used for data exfiltration or command-and-control communication.

SOC{...}Hint available

8 tasks · 315 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Intermediate

Requires foundational alert triage skills. Multiple data sources to correlate.

Prerequisites

  • Basic understanding of security alerts
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more