PinnedCyberJunnkieinSystem WeaknessIncident Response : Analyzing Dogwalk ZeroDay (LetsDefend)Hello guys, i will be solving a incident response case on letsdefend platform which provides a simulated SOC corporate environment. We…6 min read·Aug 23, 2022--2--2
CyberJunnkiePre5 Forensics (CyberHackathon 23 Online Qualifiers)We are provided with event logs and registry hives as artifacts4 min read·Nov 11, 2023----
CyberJunnkiePhishing Email Challenge by LetsDefendIn this writeup we will be analyzing a email to determine whether it was a phishing attempt or not. We will only use a mail client(You can…4 min read·Dec 4, 2022----
CyberJunnkiePrintNightmare : Memory forensics and Network forensics challenge -> LetsdefendToday i will be solving printnightmare challenge in which we are provided with network capture and an memory image to analyse. We will use…6 min read·Oct 26, 2022----
CyberJunnkieinSystem WeaknessIncident Response LetsDefend : Detecting Web App attack and detecting persistenceHello Blue teamers and Red Teamers. In this post , we will be analyzing some apache access logs to uncover asset discovery, login brute…5 min read·Oct 8, 2022----
CyberJunnkieinSystem WeaknessWindows Forensics Analysis: Analyzing Forensics Artifacts to Uncover System compromise and RDP…Hello Blue Teamers . I created Another Challenge on Letsdefend platform. This challenge is about Windows Forensics and how to parse and…8 min read·Sep 29, 2022----
CyberJunnkieinSystem WeaknessIncident Response : Analyzing Log4j RCE exploited via MineCraft gameWe have a Incident related to Log4j activities escalated by L1 Analyst.6 min read·Sep 28, 2022----
CyberJunnkieinSystem WeaknessThreat Hunting via Event LogsThis is just a short writeup showcasing event logs analysis3 min read·Aug 27, 2022----
CyberJunnkieinSystem WeaknessMemory forensics Challenge (Letsdefend)Hi guys , i made this windows memory forensics challenge which was published on letsdefend. I am writing this writeup in the intended way…5 min read·Aug 8, 2022--1--1