Jan 30 路 8 min read 路 Task 1: Introduction Incident Scenario Our user "Hattori" has reported strange behavior on his computer and realized that some PDF files have been encrypted, including a critical document to the company named important_document.pdf. He decided to rep...
Join discussion
Apr 13, 2025 路 4 min read 路 馃敆 Link del Laboratorio: https://cyberdefenders.org/blueteam-ctf-challenges/amadey-apt-c-36/ 馃О Herramienta utilizada: Volatility 3 Escenario Una alerta fuera de horario del sistema Endpoint Detection and Response (EDR) se帽ala actividad sospechosa e...
Join discussion