2025 Cyber Apocalypse: Silent Trap
Analyze compromised system through network traffic and memory forensics to uncover malware deployment and credential theft
2025 Cyber Apocalypse: Stealth Invasion
Analyze memory dump of compromised Linux system to uncover malicious Chrome extension and credential theft
2024 Hack The Boo: Ghostly Persistence
Analyze Windows event logs to uncover two-part flag hidden in PowerShell command execution and log artifacts
2024 Hack The Boo: Practice
Reverse engineer encoded strings from JavaScript code to extract hidden data
2024 Business CTF - Vault of Hope: Caving
Windows forensics challenge analyzing PowerShell logs and obfuscated scripts to detect intrusion attempts
2024 Cyber Apocalypse: Data Siege
Exploit ActiveMQ vulnerability, extract .NET malware, decrypt C2 communications, and recover multi-part flag
2024 Cyber Apocalypse: Phreaky
Analyze PCAP to detect SMTP exfiltration and reconstruct PDF from parts
2024 Cyber Apocalypse: Confinement
Analyze disk image to extract and decrypt ransomware, then decrypt encrypted files
2024 Cyber Apocalypse: An Unusual Sighting
Extract flag from HTML content hidden in email file
2024 Cyber Apocalypse: Fake Boost
Extract obfuscated PowerShell from PCAP, deobfuscate, decrypt AES payload, and recover flag parts
2024 Cyber Apocalypse: Game Invitation
Analyze malicious DOCM file, extract XOR-encrypted payload, decrypt JavaScript layers, and recover C2 beacon
2024 Cyber Apocalypse: Oblique Final
Analyze memory dump with Volatility and extract artifacts from system state
2024 Cyber Apocalypse: Pursue The Tracks
Analyze MFT records to answer forensic questions about file activity
2024 Cyber Apocalypse: Urgent
Decode base64 email attachments and URL-decode payloads to uncover phishing attack details
2023 Business CTF: ICS Intrusion
Analyze captured Modbus network traffic to extract sensitive data from industrial control registers.
2023 Cyber Apocalypse: Extraterrestrial Persistence
Analyze and decode malicious script with systemd persistence mechanism