Q1: In the process of dissecting the AsyncRAT payload, you discover a variable in the […]
Lockpick4.0
Sherlock Scenario Forela.org’s IT Helpdesk has been receiving reports from employees experiencing unusual behaviour on […]
Lockpick3.0
The threat actors of the Lockpick variant of Ransomware seem to have increased their skillset. […]
Hidden Backdoor
A senior developer at AINokhba Enterprises discovered an unfamiliar file named “NotionSetup.exe” on their workstation. […]
Holmes 2025 2: The Watchman’s Residue
With help from D.I. Lestrade, Holmes acquires logs from a compromised MSP connected to the […]
SillyEli – HTB Write-up
Task 1,2,3: Time zone máy user: Check thử qua lịch sử web của user: Nhìn […]
Caught – Hack the Box Write-up
MEGACORP, a leader in tech innovation, recently identified an insider threat: a disgruntled former employee […]
The Tunnel Without Walls – Hackthebox Write-up
Task 1: What is the Linux kernel version of the provided image? Dùng vol -f […]
Window Forensics
Tổng quan về kiểm tra dấu vết thực thi chương trình (Program Execution) A. Làm […]
Writing: HOW TO BUILD CONCLUSION
The lesson today is the end of series “HOW TO BUILD…..”. Demo The examiner should […]
