Scenario

You were hired as a SOC Analyst for one of the biggest Juice Shops in the world and an attacker has made their way into your network.

Your tasks are:

https://tryhackme.com/room/juicydetails


we are provided with 3 log files

Screenshot 2025-08-05 042557.png

most of the lab we will be using access.log


1-What tools did the attacker use? (Order by the occurrence in the log)

nmap, hydra, sqlmap, curl, feroxbuster

Screenshot 2025-08-05 043101.png