Showing 3 Result(s)

SwampCTF 2024 Forensics: New C2 Channel? Writeup

CTF link. Sometimes you can exfiltrate data with more than just plain text. Can you figure out how the attacker smuggled out the flag on our network? If we examine HTTP requests, we notice the flag in the ASCII DUMP section. swampCTF{w3lc0m3_70_7h3_l4nd_0f_7h3_pc4p} Aleyna DoğanHello, I am Aleyna Doğan. I work as a Cyber Threat Intelligence …

TexSAW2024 Forensics: Malicious Threat Writeup

CTF link. In the wake of recent security breaches, it has become paramount to ensure the integrity and safety of our systems. A routine audit of our admin activity logs has revealed several anomalies that could suggest a breach or an attempted breach. These logs are critical to understanding the actions taken by users with …