Cyber Apocalypse CTF 2025: Tales from Eldoria A deep dive into the Eldoria CTF—solving OSINT, AI, ML, reverse engineering, and web challenges. This writeup breaks down my approach, solutions, and lessons learned in the quest for the Dragon’s Heart.
Hack The Box Sherlock: Takedown Suspicious network activity points to a potential security breach. Dive into this investigation as we analyze PCAP data, uncover hidden threats, and trace unauthorized access with Wireshark.
HTB Sherlock Brutus - Analyzing SSH Brute-Force and Unix Logs Explore how to detect SSH brute-force attacks and track post-compromise actions using Unix logs in HackTheBox's Sherlock Brutus challenge. From access tracing to privilege escalation, uncover critical insights.