Web Attack Forensics - Drone Alone Tryhackme Walkthrough

Solved the TryHackMe Web Attack Forensics AOC 2025 room by analyzing web logs, identifying attacker behavior, and uncovering malicious activity. This walkthrough explains each forensic step, attack pattern, and detection technique used in real-world web investigations.

OFFENSIVE SECURITYDFIR TRAININGADVENT OF CYBER 2025METHODOLOGYWEB APPLICATION SECURITYSPLUNKTOOLSVULNERABILITY ANALYSISTRYHACKME WRITEUPSSPLUNK TUTORIALSCTFPENETRATION TESTINGNETWORK DISCOVERYTRYHACKME WALKTHROUGHCYBERSECURITY CHALLENGESTRYHACKME ROOM SOLUTIONSTRYHACKME ANSWERSCYBERSECURITY LABSBLUE TEAM TRAININGCYBERSECURITYETHICAL HACKINGTRYHACKMEPROVING GROUNDSSPLUNK TUTORIALSSOC AND SIEM LABSDEFENSIVE SECURITYLLM SECURITYHANDS ON SECURITY LABSELASTIC SIEM

Jawstar

12/15/20251 min read

Task 2 : Web Attack Forensics

Answer the questions below

What is the reconnaissance executable file name?
whoami.exe

What executable did the attacker attempt to run through the command injection?
powershell.exe