본문 바로가기 메뉴 바로가기

N0cT1s41

프로필사진
  • 글쓰기
  • 관리
  • 태그
  • 방명록
  • RSS

N0cT1s41

검색하기 폼
  • IT (105)
    • Programing (3)
      • PYTHON (3)
    • Digital Forensics (47)
      • 디지털 포렌식 개론 (8)
      • DISK Forensic (13)
      • File System (6)
      • Artifact (8)
      • Memory Forensic (4)
      • File Structure (5)
      • Tools (2)
      • Anti-Forensic (1)
    • Incident Response (3)
      • MITRE ATT&CK (3)
    • CTF (52)
      • MEMLABS (7)
      • CyberDefenders (20)
      • root me (8)
      • FIESTA (2)
      • Net-Force (1)
      • Dreamhack (5)
      • CTF-D (4)
      • 기타 CTF (5)
  • 방명록

IT (105)
Cyberdefenders - Silent Breach Lab

1. Case Overview:The IMF is hit by a cyber attack compromising sensitive data. Luther sends Ethan to retrieve crucial information from a compromised server. Despite warnings, Ethan downloads the intel, which later becomes unreadable. To recover it, he creates a forensic image and asks Benji for help in decoding the files.Q1. What is the MD5 hash of the potentially malicious EXE file the user dow..

CTF/CyberDefenders 2025. 7. 3. 14:06
MITRE ATT&CK - Resource Development

보호되어 있는 글입니다.

보호글 2025. 5. 13. 22:03
MITRE ATT&CK - Reconnaissance

보호되어 있는 글입니다.

보호글 2025. 5. 11. 06:28
MITRE ATT&CK란?

보호되어 있는 글입니다.

보호글 2025. 5. 9. 00:08
Cyberdefenders - KrakenKeylogger Lab

1. Case Overview:An employee at a large company was assigned a task with a two-day deadline. Realizing that he could not complete the task in that timeframe, he sought help from someone else. After one day, he received a notification from that person who informed him that he had managed to finish the assignment and sent it to the employee as a test. However, the person also sent a message to the..

CTF/CyberDefenders 2025. 5. 7. 18:52
CorporateSecrets Lab

해당 문제는 CyberDefenders의 CorporateSecrets Lab 문제에 대한 풀이입니다Q1. What is the current build number on the system?FTK Imager를 통해 SOFTWARE를 추출하고 Registry Explorer로 열어 Current Version-Current Build Number를 보면 확인 할 수 있다.Q2.How many users are there?FTK Imager에서 Users를 확인하면 사용자를 확인 할 수 있다.Q3.What is the CRC64 hash of the file "fruit_apricot.jpg"?CRC-64 hash cheksum이라 검색해보니 Toolkit Bay 사이트를 확인할 수 있었다.Q4. Wha..

CTF/CyberDefenders 2025. 4. 21. 18:41
이전 1 2 3 4 ··· 18 다음
이전 다음

Blog is powered by Tistory / Designed by Tistory

티스토리툴바