TryHackMe - Disk Filtration challenge






     Someone decided corporate secrets are a free-for-all and our dear Liam thought he could play sneak-and-leak. This writeup walks through the hunt: the breadcrumbs on the endpoint, the USB that betrayed him, the dusty hotspot he used to dodge network logs, and the little executable the external actor insisted he run. Read it like a detective novel, but with more registry keys and less melodrama. Screenshots are left exactly where you asked — because evidence should always stare you in the face.


Scenario

Tech THM discovered their critical data had been leaked to the competitors. After an internal investigation, the company suspects Liam, a recently terminated employee who was working as a system engineer with Tech THM. This suspicion was raised as Liam had access to the leaked data in his company-provided workstation. He often worked late hours without clear justification for his extended presence. He was also caught roaming around the critical server room and taking pictures of the entry gate. Following these suspicions, Liam’s workstation (provided by the company) was investigated. The initial investigation suggests that an external entity was also helping Liam.








Comments

Popular posts from this blog

TryHackMe - Typo Snare Threat Hunter Simulator (medium level)

TryHackMe - Threat Hunting Simulator - Health Hazard

TryHackmMe Side Quest AOC 2025 - Scheme Catcher (Insane Level)