Bank heist beaconing
ScenarioA workstation begins periodic connections to an external IP after a phishing click.
Objectives3
- ▸Identify suspected beacon destination
- ▸Propose a containment step
- ▸List one host triage command
Dataset Hints2
- 💡
Use zeek_conn_small.jsonl - 💡
Look for periodic low byte-count connections