TryHackMe - Disk Filtration challenge
Someone decided corporate secrets are a free-for-all and our dear Liam thought he could play sneak-and-leak. This writeup walks through the hunt: the breadcrumbs on the endpoint, the USB that betrayed him, the dusty hotspot he used to dodge network logs, and the little executable the external actor insisted he run. Read it like a detective novel, but with more registry keys and less melodrama. Screenshots are left exactly where you asked — because evidence should always stare you in the face.
Scenario
Tech THM discovered their critical data had been leaked to the competitors. After an internal investigation, the company suspects Liam, a recently terminated employee who was working as a system engineer with Tech THM. This suspicion was raised as Liam had access to the leaked data in his company-provided workstation. He often worked late hours without clear justification for his extended presence. He was also caught roaming around the critical server room and taking pictures of the entry gate. Following these suspicions, Liam’s workstation (provided by the company) was investigated. The initial investigation suggests that an external entity was also helping Liam.

Comments
Post a Comment