Static Analysis of the Dexter Malware Explore a detailed static analysis of malware, uncovering key indicators of compromise, malicious activities, and underlying techniques used for process monitoring and memory manipulation.
HTB Sherlock Brutus - Analyzing SSH Brute-Force and Unix Logs Explore how to detect SSH brute-force attacks and track post-compromise actions using Unix logs in HackTheBox's Sherlock Brutus challenge. From access tracing to privilege escalation, uncover critical insights.
StandCon 2023 CTF Writeup Introduction This is our first CTF Competition hosted by n0h4ts. We managed to complete 3 challenges which was a decent accomplishment for our first attempt. This is a small writeup of the challenges that my team and I completed. Fetus Crypto A ROT encryption Featus Crypto was an easy one.