deadface DEADFACE CTF: Host Busters Walkthrough Host Busters was a series of challenges during DEADFACE CTF that provided competitors with an adversary's live Linux system. The goal was to investigate the system: see what artifacts could be found and characterize the behavior of the system.
volatility Carving Sensitive Information from Memory with Volatility In this blog, I'll demonstrate how to carve out a malicious executable found in a memory dump file. I'll also show how to extract password hashes and crack the password from the hash.
volatility Memory Forensics on Windows 10 with Volatility Volatility is a tool that can be used to analyze a volatile memory of a system. With this easy-to-use tool, you can inspect processes, look at command history, and even pull files and passwords from a system without even being on the system!
ctf SwampCTF - Last Transmission Last Transmission is another steganography challenge. It's not as sophisticated as some of the others - but its point value was low, so that's to be expected. This one actually
ctf SwampCTF - Leap of Faith This is another steganography challenge that required the use of several tools atypical of traditional steganography. I found this one very challenging at first, and it required a lot of
ctf SwampCTF - Neo Neo is the first challenge I solved in SwampCTF. This challenge was worth 50 points and was definitely one of the easier challenges to solve. -------------------------------------------------------------------------------- Accessing the Challenge Clicking
ctf KringleCon 2018 - Lethal ForensicELFication Lethal ForensicELFication was another very easy challenge that demonstrated how vim stores its history. This challenge was definitely designed for beginners - and there's nothing wrong with that! It was
ctf KringleCon 2018 - Stall Mucking Report Stall Mucking Report involved uploading a document to an SMB share. The catch: the NPC doesn't give you the username or the password. This challenge was also fairly easy, and