Skip to main content

Blog

Dream Job-2
·1109 words·6 mins· loading · loading
An in-depth Threat Intelligence investigation of the Hack The Box Sherlocks challenge Dream Job-2, focused on malware used by the Lazarus Group during Operation Dream Job. This analysis covers malware lineage, macro-based initial access, payload staging, and defensive detection opportunities
HookFlare
·1040 words·5 mins· loading · loading
An Android DFIR investigation of the HTB Sherlocks challenge HookFlare, reconstructing an SMS-based phishing attack, malicious app behavior, permission abuse, and encrypted data exfiltration.
TryHack3M: Bricks Heist
·1486 words·7 mins· loading · loading
Crack the code, command the exploit! Dive into the heart of the system with just an RCE CVE as your key.
Sherlock: PhishNet (HTB Challenge)
·696 words·4 mins· loading · loading
An in-depth forensic investigation of a phishing email from the HTB Sherlocks series. We analyze email headers, SPF validation, and a disguised malicious attachment used in a spearphishing attack.
Cypher
·608 words·3 mins· loading · loading
A full walkthrough of the Hack The Box ‘Cypher’ challenge from Season 7
linux cut command
·1192 words·6 mins· loading · loading
A comprehensive guide to the linux cut command
tGIF
·330 words·2 mins· loading · loading
P3rf3ctr00tCTF misc chalenge
Pores
·559 words·3 mins· loading · loading
P3rf3ctr00t CTF rev chalenge
Flow
·564 words·3 mins· loading · loading
P3rf3ctr00tCTF PWN chalenge
Juggl3r
·430 words·3 mins· loading · loading
Juggler challenge from blockctf