
ElMariachi-PC - 10.150.150.69
We first begin by performing an nmap scan to determine what ports are open and what services are running behind them. ➜ PWNTILLDAWN nmap -sC -sV -p- -T4 10.150.150.69 Starting Nmap 7.92 ( https:/...
We first begin by performing an nmap scan to determine what ports are open and what services are running behind them. ➜ PWNTILLDAWN nmap -sC -sV -p- -T4 10.150.150.69 Starting Nmap 7.92 ( https:/...
Hey you and welcome back to my blog. Today i will be sharing my thought process on the two forensic challenges i managed to solve at the DCTF 2022 organized by the DragonSec SI. This was a Jeopardy...
SHA1SUM bd7239a7c1e33f4d616242fe892888befc9faa50 Published March 3, 2022 Authors Brad Duncan and Manuel GRegal Size 1.3...
Hey you, welcome to my blog. Today i will be sharing my learnings on using sysmon. Many applications record errors and events in proprietary error logs, each with their own format and user interfa...
Hey guys and welcome to my blog. Today i will be tackling all challenges i knocked in Urchinsec’s CTF. This was a jeopardy type CTF hosted by our competitors, Urchinsec. I majorly focussed on foren...
MACHINE Bolt MACHINE CREATOR d4rkpayl0ad & TheCyberGeek DIFFICULTY Medium MACHINE IP 10.10.11.114 We firs...
Coming Soon
Room Windows Forensics 1 Room Creator umairalizafar, tryhackme Scenario: One of the Desktops in the research lab at Organization X is suspected to ha...
Hey you and welcome to my blog. Today i’ll be solving a challenge from BTLO called Meta. It’s under the Digital forensics category but i found it more of OSINT. The challenge was relatively easy. ...
Hey you😅! Welcome to my blog. Today i will take you through my thought process on how i was able to solve the “Paranoid” Challenge on BTLO. This is an Incident Response kinda challenge where we are...