LAB 2.4-C
Tier 1: In-Browser
Obj 2.4 · intermediate · ~10min
Application Attack Identifier
Analyze real-world evidence artifacts — HTTP requests, server logs, and crash reports — and classify the attack type and monitoring indicator that would detect it.
What You’ll Practice
- Recognizing SQL injection, XSS, buffer overflow, directory traversal, privilege escalation, command injection, CSRF, and replay attacks from raw evidence
- Mapping attacks to the monitoring indicators that catch them
- Reading HTTP request/response pairs, authentication logs, and application crash dumps
How the Exam Tests This
Objective 2.4 is a “Given a scenario” objective — the heaviest PBQ format on the exam. You’ll be shown evidence and need to identify what’s happening. This lab mirrors that format: evidence first, classification second.
Scoring
Each scenario is worth 2 points: 1 for correct attack classification, 1 for correct indicator identification. Scenarios are randomized each session to prevent memorization.
HOW IT WORKS
- 1. You'll be shown evidence artifacts — HTTP requests, log entries, crash reports
- 2. Classify the attack type based on the evidence
- 3. Identify which monitoring indicator would detect this attack
- 4. Review the explanation to reinforce the pattern
8 scenarios · ~10 minutes