TryHackMe — Investigating Windows Challenge WalkthroughA Windows endpoint forensic investigation using Event Viewer, PowerShell, and VirusTotal5h ago5h ago
HackTheBox — Brutus Sherlock WalkthroughInvestigating a Brute Force Attack Using the auth.log and wtmp log.Mar 16Mar 16
LetsDefend — NTFS Forensics Challenge WalkthroughInvestigating a Compromised Endpoint’s $MFT Using MFTExplorerMar 9Mar 9
LetsDefend — Obfuscated HTA Challenge WalkthroughInvestigating a suspicious HTA file with Detect-It-Easy, CyberChef, and MITRE ATT&CK.Mar 2Mar 2
CyberDefenders —IcedID Lab WalkthroughA Cyber Threat Intelligence Challenge using VirusTotal, MITRE ATT&CK, and Recorded Future Triage.Feb 17Feb 17
Blue Team Labs Online — Browser Forensics — Cryptominer WalkthroughAn incident response challenge using FTK Imager and the Google Chrome browser cache.Feb 10Feb 10
LetsDefend — Remote Working Challenge WalkthroughInvestigating a suspicious XLSM file with VirusTotalFeb 3Feb 3
LetsDefend — PHP-CGI (CVE-2024–4577) Challenge WalkthroughInvestigating a web server exploitation attempt using Apache & PHP logs, Notepad++, and the Windows Prefetch.Jan 27Jan 27
LetsDefend — YARA Rule Challenge WalkthroughAn introduction to YARA rules using Notepad++, IDA, and Hybrid AnalysisJan 20Jan 20
LetsDefend— Malicious AutoIT Challenge WalkthroughA malicious script analysis challenge using Detect It Easy, AutoIt-Ripper, and Notepad++Jan 13Jan 13