Back to all projects







57133923
Project 5.4: LOG(N) Pacific Internship: Threat Hunting Scenario 4: PwnCrypt Ransomware Outbreak
2025-10-24
Samson Otori
Personal Project
Blue Team
Cloud

Blue Team
Cloud
Threat Hunting
Microsoft Defender for Endpoint
Ransomware Analysis
Incident Response
EDR
KQL
PowerShell
Microsoft Defender for Endpoint
KQL
PowerShell
Windows
Continue Reading
PreviousProject 5.5: LOG(N) Pacific Internship – Incident Response Scenario 1: Brute Force Attack Detection with Microsoft Sentinel

Project 5.5: LOG(N) Pacific Internship – Incident Response Scenario 1: Brute Force Attack Detection with Microsoft Sentinel
Investigating a simulated brute-force attack scenario using Microsoft Sentinel and Defender for Endpoint, following the NIST 800-61 inciden…
Nov 8, 2025
Read previous
NextProject 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration

Project 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration
A comprehensive threat hunting exercise investigating suspected data exfiltration by a disgruntled employee, using Microsoft Defender for E…
Oct 20, 2025
Read next
Related Projects

Blue Team
Project 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration
Oct 20Project

Blue Team
Project 5.2: LOG(N) Pacific Internship: Threat Hunting Scenario 2: Sudden Network Slowdown
Oct 14Project

Blue Team
Project 5.6: LOG(N) Pacific Internship – Incident Response Scenario 2: PowerShell Suspicious Web Request with Microsoft Sentinel
Nov 10Project
Oldest Projects
Newest Projects

Blue Team
Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
Nov 21Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Nov 17Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure
