Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
    • Security
Google Cloud Platform icon
Labs

Threat Hunting: Network IOCs

In this lab, you will develop essential forensic investigation skills by analyzing network traffic, performing file system forensics, and conducting memory analysis to detect Indicators of Compromise (IOCs). By the end of the session, you will be proficient in identifying malicious activities within network captures, detecting hidden malware and persistence mechanisms in disk images, and uncovering suspicious processes and code injections in memory dumps. These techniques will enhance your ability to anticipate, identify, and respond to security incidents effectively.

Google Cloud Platform icon
Lab platform
Lab Info
Rating
(38)
Level
Beginner
Last updated
Aug 04, 2025
Duration
1h 0m

Contact sales

By clicking submit, you agree to our Privacy Policy and Terms of Use.
Table of Contents
  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Network Traffic Analysis for Malicious Activity

    You will first be guided through the process of analyzing network traffic to identify Indicators of Compromise (IOCs) such as malicious IP addresses, suspicious domains, and URLs. You will learn how to use tools like Wireshark and Tshark to filter, examine, and interpret network traffic data. The focus will be on recognizing and interpreting common attack patterns, such as phishing, command-and-control (C2) communications, and data exfiltration attempts.

  3. Challenge

    File System Forensics for Malware Detection

    In this challenge, you will perform file system forensics on a compromised disk image to identify Indicators of Compromise (IOCs) such as malicious files, suspicious file paths, modified timestamps, and persistence mechanisms. The challenge will focus on using tools like Sleuth Kit to explore the file system, analyze file metadata, and detect hidden malware. You will also learn how to hash files for comparison against known malware signatures and detect tampered files.

  4. Challenge

    Memory Analysis for Live IOC Detection

    To finish off, you will focus on memory forensics, where participants will analyze a captured memory image to identify Indicators of Compromise (IOCs) such as suspicious running processes, injected code, and unauthorized network connections. Participants will use Volatility to explore the memory image, detecting signs of active or past compromise. The challenge will also cover techniques for identifying persistence mechanisms and cross-referencing memory artifacts with known IOCs.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

About the author

Sean Wilkins is an accomplished networking consultant and writer for infoDispersion (www.infodispersion.com) who has been in the IT field for over 20 years working with several large enterprises.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight