Oste's Blog
CTF Player | DFIR | Pentester
HOME
CATEGORIES
TAGS
ARCHIVES
ABOUT
Home
Archives
Archives
Cancel
Archives
2023
16
Dec
DART CTF - Objective 3
16
Dec
DART CTF - Objective 2
16
Dec
DART CTF - Objective 1
05
Nov
iSleuth - The iOS Odyssey Challenge Walkthrough
05
Nov
BSides Nairobi 2023 Cyber Challenge Walkthrough
21
Sep
The O.MG Cable Explained
25
Jun
PDF Analysis
23
Apr
TakeOver
23
Apr
Apache Explained
05
Jan
Trilium Notes (Self-Hosted)
2022
15
Nov
2022-03-21 - TRAFFIC ANALYSIS EXERCISE - BURNINCANDLE
15
Nov
R2D2 Backdoor - Memory Forensics
07
Oct
Browser & Blockchain Forensics
24
Sep
DownUnderCTF 2022
16
Aug
Catch
20
Jul
ShehacksKE Intervarsity CTF - KCA
14
Jun
Cheat Sheets
01
Jun
Intro To Ansible
16
May
TJCTF 2022
16
May
DC-1
12
May
Sort your problems😅✌🏼
12
May
Redeemer
12
May
Preigition
12
May
Meow
12
May
Gaara
12
May
Fawn
12
May
Explosion
12
May
Dancing
23
Apr
Shibboleth
21
Apr
PwnDrive Academy - 10.150.150.11
21
Apr
Portal - 10.150.150.12
21
Apr
ElMariachi-PC - 10.150.150.69
18
Apr
DCTF 2022
30
Mar
HawkEye
24
Mar
Sysmon
09
Mar
URCHINSEC CTF MMXXII Forensics WriteUp
08
Mar
HTB - Bolt
04
Mar
Dashboards - Homer
27
Feb
Windows-Forensics-1
27
Feb
BTLO - Meta
26
Feb
BTLO - Paranoid
15
Feb
Gallery
15
Feb
Archetype
15
Feb
Metaspike Email Forensics CTF
04
Feb
Lab Setup on Raspberry Pi / VM
04
Feb
Installing Portainer on Docker
22
Jan
KnightCTF-2022
18
Jan
Corrosion
17
Jan
Steel Mountain
05
Jan
Active Directory Lab Setup - (Mayor's Movement, Pivoting & Persistence Course Walkthrough)
2021
29
Dec
Network Analysis – Ransomware
28
Dec
Suspicious USB
28
Dec
Network Analysis – Malware Compromise
14
Dec
Road
02
Dec
Running Wordpress on Docker
02
Dec
Docker Installation
02
Dec
Docker Commands
01
Dec
PowerView Walkthrough
01
Dec
Easy peasy
01
Dec
File Recovery
Recent Update
R2D2 Backdoor - Memory Forensics
Browser & Blockchain Forensics
DownUnderCTF 2022
ShehacksKE Intervarsity CTF - KCA
Cheat Sheets
Trending Tags
windows
ubuntu
docker
wireshark
linux
metasploit
docker images
docker containers
webapp
redteaming
Trending Tags
windows
ubuntu
docker
wireshark
linux
metasploit
docker images
docker containers
webapp
redteaming