Blogs

Indian Army Terrier Cyber Quest 2025

The Boot2Root CTF Indian Army Terrier Cyber Quest 2025(IATCQ2025) tested core penetration testing skills, including enumeration, exploitation, and privilege escalation.

CTFTCQ 2025EnumerationExploitationCybersecurityPenetration TestingPrivilege Escalation
10/1/20250xDEAD
Read More

CyberDefender: Emprisa Maldoc Challenge Writeup

Reconstruct fragmented shellcode from a malicious RTF document and emulate its execution using rtfdump.py and scdbg to identify CVE-2017-11882 payload delivery.

CTFRTF MaldocCybersecurityCVE-2017-11882CyberDefendersThreat HuntingMalware AnalysisPayload AnalysisDigital ForensicsIncident Response
11/1/20230xDEAD
Read More

CyberDefender: Flare-on 3 Lab Challenge Writeup

Analyze and reverse engineer complex malicious challenges using static and dynamic analysis tools to uncover hidden functionality and extract IOCs.

CTFObfuscationCybersecurityCyberDefendersThreat HuntingStatic AnalysisMalware AnalysisDynamic AnalysisIncident ResponseDigital Forensics
11/5/20230xDEAD
Read More

Phishing Email Challenge

Your email address has been leaked and you receive an email from Paypal in German. Try to analyze the suspicious email.

CTFPhishingForensicsCybersecurityEmail AnalysisCyberDefendersMalware AnalysisIncident ResponseThreat Intelligence
11/8/20230xDEAD
Read More

CyberDefender: Qradar101 Lab Challenge Writeup

Analyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

CTFSIEMIBM QRadarLog AnalysisMITRE ATT&CKCybersecurityThreat HuntingCyberDefendersMalware AnalysisIncident Response
11/11/20230xDEAD
Read More

Sans:Holiday Hack 2022 Challenge

Step into the magical world of KringleCon and the SANS Holiday Hack Challenge 2022, where cybersecurity meets storytelling. This challenge combines hands-on exercises in network forensics, malware analysis, cloud security, CI/CD exploitation, blockchain attacks, and more — all wrapped in a festive narrative at the North Pole.

CTFAWSDevSecOpsLog AnalysisCybersecuritySANS ChallengeThreat HuntingCloud SecurityCI/CD SecurityGitHub Security
11/20/20230xDEAD
Read More

Suspicious Browser Extension Challenge

A person working in the accounting department wanted to add a browser extension, but it was deleted from his device because it was perceived as harmful by AVs.

CTFKeyloggerObfuscationCybersecurityBrowser SecurityMalware AnalysisCredential TheftNetwork ForensicsSupply Chain AttackReverse Engineering
11/22/20230xDEAD
Read More

CyberDefender: Tomcat Takeover Lab Challenge Writeup

Analyze network traffic using Wireshark's custom columns, filters, and statistics to identify suspicious web server administration access and potential compromise.

CTFTomcatWiresharkPersistenceNetworkMinerMITRE ATT&CKCybersecurityReverse ShellCyberDefendersNetwork Forensics
11/24/20230xDEAD
Read More

Private Investigator Challenge

You’re hired by UVW88 Inc. to investigate Ron, a purchasing manager suspected of leaking product launch details. After physical surveillance shows nothing, you capture and analyze his home WiFi traffic for clues.

CTFWiresharkAircrack-ngCybersecurityVoIP AnalysisWiFi ForensicsInsider ThreatWireless SecurityNetwork Forensics
11/24/20230xDEAD
Read More
Page 1 of 2Next

© 2025 Radheshyam Janwa. All rights reserved