Respond to a Website Defacement
In this lab, you’ll practice responding to a website defacement. When you’re finished, you’ll have responded to a website defacement, employed digital forensic analysis to assess the situation, restored the website from a backup, and secured the web server from further exploitation.
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Triage and collect artifacts post incident
In this challenge, you’ll confirm the incident, find and collect evidence in artifact bundles, and simulate sending these artifacts to an external location.
Challenge
Conduct forensic analysis to determine root cause
In this challenge, you will examine log files and system data, conducting digital forensic analysis to find the root cause of the website defacement.
Challenge
Recover the systems that were affected to normal working status
In this challenge, you will recover the system to normal working status by patching the exploited vulnerability, and restoring a backup that was taken before the website defacement.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Basic knowledge of:
- Linux Operating Systems
- System administration
- Web servers
- Websites
- Security best practices.