The notorious hacking group Dark Kittens has struck again! Globomantics, an international conglomerate that runs an artificial island in the Gulf of Mexico for their "ideal society" experiment, has detected unusual activity on one of their administrator workstations. Their security team has reason to believe that the Dark Kittens have compromised the system and are using Windows Registry modifications to maintain persistence. As a security engineer contracted by Globomantics, your mission is to investigate the compromised system's registry for evidence of the attack, identify the persistence mechanisms being used, and collect forensic evidence that could help track down the attackers.
This lab focuses on Windows Registry forensics, providing a safe environment to learn and practice identifying common registry-based persistence techniques used by attackers.
This lab has been designed to be completely safe for your host system. All registry modifications are contained to a dedicated test key under HKCU\Software\DarkKittensLab, which will not affect system operations. The cleanup script will remove all test registry keys created during the lab.
This lab is designed to run entirely on a Windows system with PowerShell, without requiring any virtual machines or cloud resources. The lab creates a safe, isolated testing environment within the Windows Registry that simulates a compromised system without affecting your actual system's security or stability.
- Windows 8, 10 Home (or any edition) or later version of Windows
- PowerShell 5.1 or later
- Administrator access to your local machine
This lab runs entirely on your local machine and does not require any network connections. The environment is contained within a dedicated registry key (HKCU:\Software\DarkKittensLab) that simulates various registry artifacts of a compromised system.
- README.md- This file with lab instructions and overview
- setup.ps1- Sets up the safe testing environment
- create_artifacts.ps1- Creates simulated malicious registry artifacts
- persistence_simulator.ps1- Explains common registry persistence techniques
- forensic_tools.ps1- Provides tools for registry analysis
- registry_diff.ps1- Compares registry states to identify changes
- evidence_collector.ps1- Collects and documents registry findings
- cleanup.ps1- Removes all test registry keys
- analysis_guide.ps1- Provides guided analysis steps
- validation.ps1- Validates findings and progress
- LAB_EXERCISES.md- Detailed exercise guide with specific tasks
- terraform/main.tf- Infrastructure definition for cloud deployment
- terraform/variables.tf- Variables for Terraform configuration
- terraform/security.tf- Security group and IAM configurations
- terraform/outputs.tf- Outputs from Terraform deployment
- terraform/security_improvements.tf- File for learners to add security enhancements
By completing this lab, you will:
- Understand common registry-based persistence techniques used by attackers
- Learn to identify suspicious registry keys and values
- Practice using PowerShell for registry forensic analysis
- Develop skills in evidence collection and documentation
- Experience the process of investigating a compromised system
- Create and document your own simulated malicious registry entries
- Generate professional incident response reports
- Apply critical thinking to security analysis scenarios
- Develop skills in differential registry analysis
- Practice manual investigation techniques essential for real-world forensics
- PowerShell Execution Issues: If scripts won't run, make sure you've set the execution policy and are running as Administrator
- Registry Access Errors: Ensure you're running with Administrator privileges
- Missing Artifacts: If artifacts aren't appearing, confirm you ran setup.ps1 before other scripts
- Report Generation Problems: Make sure you've collected at least 3 pieces of evidence before generating a report
- Terraform Review Validation: If validation.ps1 keeps failing, check that you've created terraform/review_answers.txt with answers to all questions
For any other issues, refer to the LAB_EXERCISES.md file for more detailed instructions on each task.
This lab has been designed to be completely safe for your host system. All registry modifications are contained to a dedicated test key under HKCU:\Software\DarkKittensLab, which will not affect system operations. The cleanup script will remove all test registry keys created during the lab.
The lab is designed to take approximately 25-30 minutes to complete once the environment is set up. However, you can spend additional time exploring the simulated artifacts and learning about registry-based persistence techniques.
You will successfully complete this lab when you can:
- Identify at least 5 different registry-based persistence mechanisms
- Document the registry paths and values associated with each technique
- Explain how each technique works to maintain persistence
- Generate a comprehensive forensic report of your findings
If you encounter any issues with the lab, please check the following:
- Ensure you're running PowerShell as Administrator
- Verify that all the lab files are in the same directory
- Make sure you run the scripts in the recommended order
Good luck, security analyst! Globomantics is counting on you to uncover the Dark Kittens' secrets.
