cpuucpuu.hashnode.dev·Nov 5, 2023How to Perform Memory Forensic Analysis in macOS Using Volatility 3Introduction Memory forensic analysis is an intricate and challenging aspect of cybersecurity, one that becomes increasingly crucial as cyber threats evolve. In earlier discussions, I introduced the installation of Volatility 3, a cutting-edge tool i...325 readsMemory Forensicsmemory forensics
K Willd4nsix.com·Aug 16, 2023Welcome to D4NSIXHello and Welcome to D4NSIX! Created this blog to help inform average Janes & Joes (and educate up-and-coming cyber professionals) on the world of CYBER. Long story short I have been indoctrinated into the cyber realm, helping understand the hackers ...1 like·174 readsforensics
Sky Davispayloadgiovanni.hashnode.dev·Aug 7, 2023Betrayl - Kase Scenarios OSINT Write Up 👺🪓🩸💔Betrayl - Kase Scenarios OSINT Write Up 👺🪓🩸💔 While researching for new OSINT challenges, I stumbled upon a website called Kase Scenarios, where you have to investigate fictional cases. Kase Scenarios has a challenge for $50 called Dark Waters, wh...11 likes·31 readsOSINT
Naimul Islamblog.kcnaiamh.com·Aug 5, 2023GetPDF Writeup - CyberDefendersPDF format is the de-facto standard in exchanging documents online. Such popularity, however, has also attracted cyber criminals in spreading malware to unsuspecting users. The ability to generate malicious pdf files to distribute malware is a functi...#digitalforensic
Naimul Islamblog.kcnaiamh.com·Aug 5, 2023HawkEye Writeup - CyberDefendersAn accountant at your organization received an email regarding an invoice with a download link. Suspicious network traffic was observed shortly after opening the email. As a SOC analyst, investigate the network trace and analyze exfiltration attempts...#digitalforensic
Naimul Islamblog.kcnaiamh.com·Aug 3, 2023Emprisa Maldoc Writeup - CyberDefendersAs a SOC analyst, you were asked to inspect a suspected document a user received in his inbox. One of your colleagues told you that he could not find anything suspicious. However, throwing the document into the sandboxing solution triggered some aler...#digitalforensic
Naimul Islamblog.kcnaiamh.com·Aug 1, 2023MalDoc101 Writeup - CyberDefendersIt is common for threat actors to utilize living off the land (LOTL) techniques, such as the execution of PowerShell to further their attacks and transition from macro code. This challenge is intended to show how you can often times perform quick ana...macros
Naimul Islamblog.kcnaiamh.com·Jul 31, 2023Obfuscated Writeup - CyberDefendersDuring your shift as a SOC analyst, the enterprise EDR alerted a suspicious behavior from an end-user machine. The user indicated that he received a recent email with a DOC file from an unknown sender and passed the document for you to analyze. 1. W...macros
Shreya Shreeshreyashree.hashnode.dev·Jul 16, 2023My Digital Defenders Cybersecurity CTF 2023 WriteupIn this first-ever blog post, I will be sharing the writeups for some of the flags that I found as a part of the Capture the Flag (CTF) competition 2023 organized by CISCO x CNI IISC x Traboda x bi0s. I had a fun time solving these challenges. For t...1 like·97 readsWeb Exploitation
Naimul Islamblog.kcnaiamh.com·Apr 7, 2023XLM Macros Writeup - CyberDefendersRecently, we have seen a resurgence of Excel-based malicous office documents. Howerver, instead of using VBA-style macros, they are using older style Excel 4 macros. This changes our approach to analyzing these documents, requiring a slightly differe...#digitalforensic