PinnedPublished inSystem WeaknessIncident Response : Analyzing Dogwalk ZeroDay (LetsDefend)Hello guys, i will be solving a incident response case on letsdefend platform which provides a simulated SOC corporate environment. We…Aug 23, 20222Aug 23, 20222
Hackathon 24 Prequalifiers: Forensics Challenge “hacked” First blood Team deathstrik3We are provided with a network capture. I start by looking at statistics to see the endpoints with most network packets. Compromised…Oct 13Oct 13
Pre5 Forensics (CyberHackathon 23 Online Qualifiers)We are provided with event logs and registry hives as artifactsNov 11, 2023Nov 11, 2023
Phishing Email Challenge by LetsDefendIn this writeup we will be analyzing a email to determine whether it was a phishing attempt or not. We will only use a mail client(You can…Dec 4, 2022Dec 4, 2022
PrintNightmare : Memory forensics and Network forensics challenge -> LetsdefendToday i will be solving printnightmare challenge in which we are provided with network capture and an memory image to analyse. We will use…Oct 26, 2022Oct 26, 2022
Published inSystem WeaknessIncident Response LetsDefend : Detecting Web App attack and detecting persistenceHello Blue teamers and Red Teamers. In this post , we will be analyzing some apache access logs to uncover asset discovery, login brute…Oct 8, 2022Oct 8, 2022
Published inSystem WeaknessWindows Forensics Analysis: Analyzing Forensics Artifacts to Uncover System compromise and RDP…Hello Blue Teamers . I created Another Challenge on Letsdefend platform. This challenge is about Windows Forensics and how to parse and…Sep 29, 2022Sep 29, 2022
Published inSystem WeaknessIncident Response : Analyzing Log4j RCE exploited via MineCraft gameWe have a Incident related to Log4j activities escalated by L1 Analyst.Sep 28, 2022Sep 28, 2022
Published inSystem WeaknessThreat Hunting via Event LogsThis is just a short writeup showcasing event logs analysisAug 27, 2022Aug 27, 2022