← All posts

Posts tagged #forensics

16 posts

writeup

2025 Cyber Apocalypse: Silent Trap

Analyze compromised system through network traffic and memory forensics to uncover malware deployment and credential theft

#htb #ctf #forensics
+4
writeup

2025 Cyber Apocalypse: Stealth Invasion

Analyze memory dump of compromised Linux system to uncover malicious Chrome extension and credential theft

#htb #ctf #forensics
+4
writeup

2024 Hack The Boo: Ghostly Persistence

Analyze Windows event logs to uncover two-part flag hidden in PowerShell command execution and log artifacts

#htb #ctf #forensics
+3
writeup

2024 Hack The Boo: Practice

Reverse engineer encoded strings from JavaScript code to extract hidden data

#htb #ctf #forensics
+2
writeup

2024 Business CTF - Vault of Hope: Caving

Windows forensics challenge analyzing PowerShell logs and obfuscated scripts to detect intrusion attempts

#htb #ctf #forensics
+3
writeup

2024 Cyber Apocalypse: Data Siege

Exploit ActiveMQ vulnerability, extract .NET malware, decrypt C2 communications, and recover multi-part flag

#htb #ctf #forensics
+5
writeup

2024 Cyber Apocalypse: Phreaky

Analyze PCAP to detect SMTP exfiltration and reconstruct PDF from parts

#htb #ctf #forensics
+4
writeup

2024 Cyber Apocalypse: Confinement

Analyze disk image to extract and decrypt ransomware, then decrypt encrypted files

#htb #ctf #forensics
+4
writeup

2024 Cyber Apocalypse: An Unusual Sighting

Extract flag from HTML content hidden in email file

#htb #ctf #forensics
+3
writeup

2024 Cyber Apocalypse: Fake Boost

Extract obfuscated PowerShell from PCAP, deobfuscate, decrypt AES payload, and recover flag parts

#htb #ctf #forensics
+5
writeup

2024 Cyber Apocalypse: Game Invitation

Analyze malicious DOCM file, extract XOR-encrypted payload, decrypt JavaScript layers, and recover C2 beacon

#htb #ctf #forensics
+5
writeup

2024 Cyber Apocalypse: Oblique Final

Analyze memory dump with Volatility and extract artifacts from system state

#htb #ctf #forensics
+3
writeup

2024 Cyber Apocalypse: Pursue The Tracks

Analyze MFT records to answer forensic questions about file activity

#htb #ctf #forensics
+4
writeup

2024 Cyber Apocalypse: Urgent

Decode base64 email attachments and URL-decode payloads to uncover phishing attack details

#htb #ctf #forensics
+4
writeup

2023 Business CTF: ICS Intrusion

Analyze captured Modbus network traffic to extract sensitive data from industrial control registers.

#htb #ctf #scada
+5
writeup

2023 Cyber Apocalypse: Extraterrestrial Persistence

Analyze and decode malicious script with systemd persistence mechanism

#htb #ctf #forensics
+3