Apr 30 · 8 min read · TL;DR: https://github.com/x-originating-ip/nandtap As part of some personal upskilling, I wanted to get a better feel for what edge-device forensics actually looks like in practice. It’s one of those
Join discussion
Mar 22 · 14 min read · A hands-on walkthrough of MBR partition analysis, NTFS boot sector examination, Master File Table record inspection, and deleted file detection using hex editors and professional forensic tools. Unde
Join discussion
Feb 1 · 3 min read · In the world of digital forensics and OSINT, metadata is the ultimate storyteller. A single JPEG can reveal the exact GPS coordinates, the altitude of the photographer, and even the direction the camera was facing. But there has always been a glaring...
Join discussion
Jan 27 · 2 min read · Introduction This challenge focuses on PDF forensics and steganography techniques. The scenario involves a confidential document from alleged "black hat hackers" containing a hidden QR code that's been covered by another image layer. Our objective is...
Join discussion
Jan 18 · 4 min read · SIEM Home LAB : This training program is designed to build a complete, fully functional security operations center (SOC) environment from scratch. We will install and configure a Security Information and Event Management (SIEM) system (ELK Stack) an...
Join discussion
Jan 12 · 4 min read · When I first started learning cybersecurity, I thought I already knew the kind of person I wanted to become. Like many beginners, I was drawn to the red team side of things, exploitation, breaking into systems, finding vulnerabilities. It looked exci...
Join discussion