Posts
logoff
Cancel

Reconnaissance Let us start with a basic enumeration with nmap. sudo nmap -sC -sV We go to http://10.10.10.223 and we get a default Apache page. We then run feroxbuster web enumeration fer...

Week4 This was the final week and we were given an Android dump. We only had 9 questions and I wasn’t too sure how this one would pan out as I have never done forensics on Android devices befor...

Week3 This week we were given a network dump in the form of a PCAP file. There were 13 challenge questions this week. To be able to analyze this PCAP file we needed to use a program called W...

Week 2 We were given a RAM Acquisition of the suspect disk for week 2. A RAM Acquisition is just a procedure of copying the contents of volatile memory to non-volatile storage. I have done a ...

The United Nations Cybercrime unit in Africa, lead by Carmen Corbin_UN created a unique Digital Forensics CTF competition for the month of May for Africa in the digital forensics cybersecurity fiel...

This is my first Offensive Security writeup of a machine on their Proving Grounds platform. I signed up for the free labs and managed to do 2 easy machines and get this writeup done before the da...

So on a recent CTF challenge I had to crack a hash which proved to be a bit challenging. I have always cracked hashes with dictionaries like the famous rockyou.txt. That's the problem with most CT...

Reconnaissance Let's start off with a NMAP scan Browsing to http://10.10.10.206 we get a page wth a bunch of posts, users and email addresses. I did a bunch of XSS and LFI but none wo...

Reconnaissance Let's start off with a NMAP scan -sV: Probe open ports to determine service/version info -sC: equivalent to --script=default We see this machine does not have any webserve...

In this day and age if you are not using 2FA, you are not taking security seriously. Most of us use our email address to log in to most of our social media, banking or use it to send our password r...