Open Side Menu
Skip to contentBrand Logo
Home
Help
Blogs
Events
Challenges
Private Groups
  1. Immersive Community
  2. Help
  3. Help

Forum Discussion

retornet's avatar
retornet
Bronze III
8 months ago
Solved

FIN7 Threat Hunting with Splunk: Ep.2 – Initial Access

Question 5 What are the last four characters of the SHA256 for 2-list.rtf? Having issues finding this one, any hints?
challenges
defensive cyber
help & support
immersive labs
  • KieranRowley's avatar
    KieranRowley
    8 months ago

    Hi retornet​ I have forwarded this to the relevant expert

retornet's avatar
retornet
Bronze III
8 months ago

Thank you KieranRowley

Featured Places

Help

Related Content
  • FIN7 Threat Hunting with Splunk: Ep.3 – Execution Logs
    1 year ago
    -jlo-
  • APT29 Threat Hunting with Splunk: Ep.4 – Clean-up & Reconnaissance
    9 months ago
    retornet
  • APT29 Threat Hunting with Splunk Ep.11 Q11
    9 months ago
    ArthurDent
  • FIN7 Threat Hunting with Splunk: Ep.3 – Execution Logs
    8 months ago
    retornet
  • APT29 Threat Hunting with Splunk: Ep.11 – Demonstrate Your Skills - Question to Q9
    10 months ago
    technowooki

Recent Discussions

  • jcberlan's avatar
    Trick or Treat on Specter Street: Widow's Web
    2 days ago
    jcberlan
  • kevinh's avatar
    CTI First Principles: Threat Actors and Attribution Question 8
    2 days ago
    kevinh
  • jpdelval's avatar
    Gemini CLI Lab issue
    2 days ago
    jpdelval
  • ArthurDent's avatar
    Microsoft Foundry Guardrails: Jailbreak Protection issue with http://metroliochat.com
    Solved
    3 days ago
    ArthurDent
  • FOB_10's avatar
    Create Teams for Students and assign tasks to be completed
    3 days ago
    FOB_10
Community HomePrivacy PolicyHelp
Powered By Khoros