🛡️
Cyber Research/Investigations
CtrlK
  • Blue Team 🤙🏾
  • LetsDefend.Io
    • Platform Details
    • SOC-146 - Phishing - Mail - Detection.
    • SOC143 - Password Stealer Detected
    • PrintNightmare Challenge
      • Gathering Intel
      • 1st/2nd Questions
      • 3rd/4th Questions
      • 5th/6th Question
      • 7th/8th Questions
      • Almost Done!
      • 9th/10th Questions
      • 11th/12 Questions
      • 13th Question
    • LetsDefend Incident Response
      • IR Review
  • RangeForce
    • Platform Details
    • Cybersecurity Essentials
    • SOC Analyst 1 / Elite
    • SOC Analyst 2
      • Botnet Challenge
  • ACM
    • Active Counter Measures
    • Cyber Threat Hunting
      • Lecture notes
      • Lab 1
        • Exercise 1
        • Exercise 2
        • Exercise 3
      • Lab 2
        • Exercise 1
        • Exercise 2
      • Conclusion
      • Final Notes & Certification
  • INE
    • Platform Details
    • INE Cloud Fundamentals Cert 'Beta'
  • TryHackMe Learning Paths
    • Obtaining Cyber Defense Path (THM)
  • AttackIQ
    • Platform Details
    • Uniting Threat and Risk Management with NIST 800-53 and MITRE ATT&CK
  • Security Blue Team (SBT)
    • Platform Details
    • Intro to Threat Hunting
    • Intro to Digital Forensics
  • Jobs
    • Group Details
    • Aptitude Test
    • <REDACTED>
    • Technical Written Scenario
Powered by GitBook
On this page

Was this helpful?

  1. ACM
  2. Cyber Threat Hunting
  3. Lab 1

Exercise 2

Using data mash to sort out the columns and seconds

We follow the IP's to make sure they are actual domains. A few safety warnings came up while proceeding on chrome, but I trust the ACM team.

ACM AC-Hunter Webpage

Next we find the other IP address through AbuseIPDB to see where its coming from and who is host.

Then we see where it's connected.

We're all connected

PreviousExercise 1NextExercise 3

Last updated 3 years ago

Was this helpful?