categories: - Reverse Engineering tags: - Reverse Engineering - Linux - crackmes.one
This is a solution submitted to the crackmes.one challenge by …
categories: - Reverse Engineering tags: - Reverse Engineering - Linux - crackmes.one
This is a solution submitted to the crackmes.one challenge by …
categories: - DFIR tags: - HackTheBox - LogAnalysis
In this very easy Sherlock, you will familiarize yourself with Unix auth.log …
categories: - DFIR - Memory Forensics tags: - Volatility - CTI - Stealer
As a cybersecurity analyst for a leading …
categories: - CTF Writeup - Pentesting tags: - nmap - vulnerabilities
Sherlock Scenario
The IDS device alerted us to a …
categories: - DFIR - Network Forensics tags: - TryHackMe - wireshark
Eric Fischer from the Purchasing Department at Bartell Ltd …
categories: - CTF Writeup - Reversing tags: - TryHackMe
Let's start with a basic warmup, can you run the …
categories: - CTF Writeup - Reversing tags: - Assembly
This site is a great reference point for x86_64 CPU architecture registers.
…
categories: [DFIR, Network Forensics] tags: [wireshark, web attacks] comments: true
An anomaly was discovered within our …
categories: - CTF Writeup - Steganography tags: - picoCTF
Description Download this image and find the flag. Image
Hints We …
categories: [CTF Writeup, Binary Exploitation] tags: [picoCTF]
Challenge Description The program provided allows you to write to a file and read …