Drew ArpinoHackTheBox — CrownJewel-1 Sherlock WalkthroughInvestigating a Compromised Domain Controller with Windows Event Logs and MFTECmdOct 13Oct 13
Drew ArpinoBlue Team Labs Online — Suspicious USB Stick Challenge WalkthroughInvestigating a suspicious USB drive with pdfid.py, pdf-parser.py, and VirusTotalOct 6Oct 6
Drew ArpinoTryHackMe — Benign Challenge Room WalkthroughAn Endpoint Forensic Investigation using SplunkSep 29Sep 29
Drew ArpinoCyberDefenders— BlackEnergy Lab WalkthroughEndpoint Forensic Investigation with Volatility 2Sep 22Sep 22
Drew ArpinoLetsDefend— Brute Force Attacks Challenge WalkthroughInvestigating a Brute Force Attack with Wireshark and Auth.logSep 15Sep 15
Drew ArpinoLetsDefend— Batch Challenge WalkthroughInvestigating a Malicious Batch Script with Notepad++ & Microsoft LearnSep 8Sep 8
Drew ArpinoLetsDefend — SOC202 — FakeGPT Malicious Chrome Extension Investigation WalkthroughInvestigating a Malicious Chrome Extension inside a simulated SOCSep 1Sep 1
Drew ArpinoLetsDefend — MSHTML Challenge WalkthroughMaldoc analysis using zipdump.py, re-search.py, & VirusTotalAug 25Aug 25
Drew ArpinoCyberDefenders — GrabThePhisher Blue Team Lab WalkthroughInvestigation of a Phishing Kit using Google, PHP, & the Telegram APIAug 18Aug 18
Drew ArpinoBlue Team Labs Online — Log Analysis— Privilege Escalation Challenge WalkthroughAnalyzing Web Server Compromise with Bash History Logs and Notepad++Aug 11Aug 11