Week4 This was the final week and we were given an Android dump. We only had 9 questions and I wasn’t too sure how this one would pan out as I have never done forensics on Android devices befor...
Week3 This week we were given a network dump in the form of a PCAP file. There were 13 challenge questions this week. To be able to analyze this PCAP file we needed to use a program called W...
Week 2 We were given a RAM Acquisition of the suspect disk for week 2. A RAM Acquisition is just a procedure of copying the contents of volatile memory to non-volatile storage. I have done a ...
The United Nations Cybercrime unit in Africa, lead by Carmen Corbin_UN created a unique Digital Forensics CTF competition for the month of May for Africa in the digital forensics cybersecurity fiel...
This is my first Offensive Security writeup of a machine on their Proving Grounds platform. I signed up for the free labs and managed to do 2 easy machines and get this writeup done before the da...
So on a recent CTF challenge I had to crack a hash which proved to be a bit challenging. I have always cracked hashes with dictionaries like the famous rockyou.txt. That's the problem with most CT...
A few weeks ago I participated to Cyber Apocalypse CTF 2021 which was organized by hackthebox.eu, cryptohack.org and code.org. I mainly focused on Pwn, Reverse and Forensic challenges. Here is t...