Posts tagged with "threat-hunting"

CyberDefender: Emprisa Maldoc Challenge Writeup

Reconstruct fragmented shellcode from a malicious RTF document and emulate its execution using rtfdump.py and scdbg to identify CVE-2017-11882 payload delivery.

11/1/2023

CybersecurityMalware AnalysisCTFDigital ForensicsIncident ResponseExploit DevelopmentCVE-2017-11882Microsoft Office ExploitRTF MaldocPayload AnalysisCyberDefendersReverse EngineeringShellcode AnalysisThreat Hunting

CyberDefender: Flare-on 3 Lab Challenge Writeup

Analyze and reverse engineer complex malicious challenges using static and dynamic analysis tools to uncover hidden functionality and extract IOCs.

11/5/2023

CybersecurityMalware AnalysisReverse EngineeringCTFCyberDefendersFlare-On ChallengeStatic AnalysisDynamic AnalysisObfuscationExploit DevelopmentIncident ResponseDigital ForensicsThreat Hunting

CyberDefender: Qradar101 Lab Challenge Writeup

Analyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

11/11/2023

CybersecurityThreat HuntingSIEMIBM QRadarCTFCyberDefendersIncident ResponseLog AnalysisMalware AnalysisMITRE ATT&CK

Sans:Holiday Hack 2022 Challenge

Step into the magical world of KringleCon and the SANS Holiday Hack Challenge 2022, where cybersecurity meets storytelling. This challenge combines hands-on exercises in network forensics, malware analysis, cloud security, CI/CD exploitation, blockchain attacks, and more — all wrapped in a festive narrative at the North Pole.

11/20/2023

CybersecurityHoliday Hack ChallengeSANS ChallengeCTFThreat HuntingIncident ResponseDigital ForensicsReverse EngineeringMalware AnalysisLog AnalysisNetwork ForensicsCloud SecurityAWSCI/CD SecurityDevSecOpsGitHub SecurityBlockchain SecurityThreat Intelligence

CyberDefender: XWorm Lab Challenge Writeup

Analyze malware behavior to identify persistence methods, evasion techniques, and C2 infrastructure by extracting artifacts and configuration data from static and dynamic analysis.

7/31/2025

CybersecurityMalware AnalysisThreat HuntingIncident ResponseCTFCyberDefendersXWormWorm MalwareKeyloggerPersistencePrivilege EscalationDefense EvasionSandbox DetectionReverse EngineeringWindows RegistryDigital ForensicsStatic AnalysisDynamic Analysis

© 2025 Radheshyam Janwa. All rights reserved