widget-card-2

Medium

Ransomware Attack

Memory analysis of ransomware infected machine

widget-card-2

Easy

Port Scan Activity

Determine evidences of port scan activity

widget-card-2

Easy

IcedID Malware Family

Challenge about IcedID

widget-card-2

Medium

PrintNightmare

PrintNightmare vulnerability analysis

widget-card-2

Hard

REvil Ransomware

Memory analysis of REvil ransomware

widget-card-2

Medium

Infection with Cobalt Strike

Analyze password stealer network traffic

widget-card-2

Easy

Http Basic Auth.

Analysis HTTP basic authentication

widget-card-2

Easy

Shellshock Attack

Analysis of shellshock attack

widget-card-2

Easy

Disclose The Agent

We reached the data of an agent leaking information. You have to disclose the agent.

widget-card-2

Medium

Memory Analysis

Analyze memory dump extracted from the Windows machine

widget-card-2

Easy

Investigate Web Attack

Analysis of web logs

widget-card-2

Hard

Windows Forensics

Investigate the Windows artifacts to understand what happened.

widget-card-2

Easy

Conti Ransomware

Conti analysis with Splunk

widget-card-2

Hard

Red Team Tools 2

We trapped the attacker. Was attacker able to hide itself enough?

widget-card-2

Hard

Red Team Tools

The investigation case about FireEye red team tools. Try to find root cause of incident.

widget-card-2

Medium

Suspicious Browser Extension

Analyze suspicious browser extension

widget-card-2

Easy

Malicious VBA

Analysis of VBA Macro source code

widget-card-2

Medium

PDF Analysis

Analyze the suspicious PDF file

widget-card-2

Hard

MSHTML

2021's 0-Day MSHTML

widget-card-2

Medium

Excel 4.0 Macros

Analysis of malicious Excel 4.0 Macros

widget-card-2

Easy

Malicious Doc

Analyze malicious .doc file

widget-card-2

Easy

Presentation As a Malware

Can ppt file be malware?

widget-card-2

Easy

Remote Working

Analysis XLS File