Posts tagged with "incident-response"

CyberDefender: Emprisa Maldoc Challenge Writeup

Reconstruct fragmented shellcode from a malicious RTF document and emulate its execution using rtfdump.py and scdbg to identify CVE-2017-11882 payload delivery.

11/1/2023

CybersecurityMalware AnalysisCTFDigital ForensicsIncident ResponseExploit DevelopmentCVE-2017-11882Microsoft Office ExploitRTF MaldocPayload AnalysisCyberDefendersReverse EngineeringShellcode AnalysisThreat Hunting

CyberDefender: Flare-on 3 Lab Challenge Writeup

Analyze and reverse engineer complex malicious challenges using static and dynamic analysis tools to uncover hidden functionality and extract IOCs.

11/5/2023

CybersecurityMalware AnalysisReverse EngineeringCTFCyberDefendersFlare-On ChallengeStatic AnalysisDynamic AnalysisObfuscationExploit DevelopmentIncident ResponseDigital ForensicsThreat Hunting

Phishing Email Challenge

Your email address has been leaked and you receive an email from Paypal in German. Try to analyze the suspicious email.

11/8/2023

CybersecurityPhishingEmail AnalysisCTFCyberDefendersThreat IntelligenceMalware AnalysisIncident ResponseForensics

CyberDefender: Qradar101 Lab Challenge Writeup

Analyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

11/11/2023

CybersecurityThreat HuntingSIEMIBM QRadarCTFCyberDefendersIncident ResponseLog AnalysisMalware AnalysisMITRE ATT&CK

Sans:Holiday Hack 2022 Challenge

Step into the magical world of KringleCon and the SANS Holiday Hack Challenge 2022, where cybersecurity meets storytelling. This challenge combines hands-on exercises in network forensics, malware analysis, cloud security, CI/CD exploitation, blockchain attacks, and more — all wrapped in a festive narrative at the North Pole.

11/20/2023

CybersecurityHoliday Hack ChallengeSANS ChallengeCTFThreat HuntingIncident ResponseDigital ForensicsReverse EngineeringMalware AnalysisLog AnalysisNetwork ForensicsCloud SecurityAWSCI/CD SecurityDevSecOpsGitHub SecurityBlockchain SecurityThreat Intelligence

CyberDefender: XWorm Lab Challenge Writeup

Analyze malware behavior to identify persistence methods, evasion techniques, and C2 infrastructure by extracting artifacts and configuration data from static and dynamic analysis.

7/31/2025

CybersecurityMalware AnalysisThreat HuntingIncident ResponseCTFCyberDefendersXWormWorm MalwareKeyloggerPersistencePrivilege EscalationDefense EvasionSandbox DetectionReverse EngineeringWindows RegistryDigital ForensicsStatic AnalysisDynamic Analysis

© 2025 Radheshyam Janwa. All rights reserved