Operation Midnight Storm — Sentinel Health Systems Breach Investigation
INTERACTIVE LAB
Score: 0
Placed: 0 / 22
Accuracy: 0%
Evidence Ingestion
Drag evidence cards onto the timeline drop zone below. Place them in chronological order to reconstruct the attack sequence.
📋
Drag evidence cards here to begin building the incident timeline
Visual Timeline
Review the reconstructed timeline. Click any event for details. Correct placements glow green; misplaced events glow red.
🕐
Place evidence in Tab 1 to see the visual timeline here
MITRE ATT&CK Kill Chain Mapper
Drag placed evidence from the pool below into the correct ATT&CK tactic column. Two rows: top row reconnaissance through credential access, bottom row discovery through impact.
Row 1: Pre-attack & Initial Compromise
Row 2: Post-Compromise & Objectives
Unmapped evidence items (drag from here):
Root Cause Analysis
Trace the attack path from initial indicators back to the root cause using the decision tree below.
Incident Report Generator
Auto-generated structured report based on your timeline reconstruction and analysis.