LetsDefend — NTFS Forensics Challenge WalkthroughInvestigating a Compromised Endpoint’s $MFT Using MFTExplorer3d ago3d ago
LetsDefend — Obfuscated HTA Challenge WalkthroughInvestigating a suspicious HTA file with Detect-It-Easy, CyberChef, and MITRE ATT&CK.Mar 2Mar 2
CyberDefenders —IcedID Lab WalkthroughA Cyber Threat Intelligence Challenge using VirusTotal, MITRE ATT&CK, and Recorded Future Triage.Feb 17Feb 17
Blue Team Labs Online — Browser Forensics — Cryptominer WalkthroughAn incident response challenge using FTK Imager and the Google Chrome browser cache.Feb 10Feb 10
LetsDefend — Remote Working Challenge WalkthroughInvestigating a suspicious XLSM file with VirusTotalFeb 3Feb 3
LetsDefend — PHP-CGI (CVE-2024–4577) Challenge WalkthroughInvestigating a web server exploitation attempt using Apache & PHP logs, Notepad++, and the Windows Prefetch.Jan 27Jan 27
LetsDefend — YARA Rule Challenge WalkthroughAn introduction to YARA rules using Notepad++, IDA, and Hybrid AnalysisJan 20Jan 20
LetsDefend— Malicious AutoIT Challenge WalkthroughA malicious script analysis challenge using Detect It Easy, AutoIt-Ripper, and Notepad++Jan 13Jan 13
HackTheBox — CrownJewel-2 Sherlock WalkthroughInvestigating a Compromised Domain Controller Using Windows Event LogsDec 23, 2024Dec 23, 2024