Recent posts
Detecting NTDS.dit Dumping
In this blog post, we’ll dive into how attackers use NTDSUTIL to dump the NTDS.dit file, and how you, as a defender, ...
Side Channel Attacks: Not Just Hardware Tricks—They’re Spilling into Cyber Threat Intelligence!
What if I told you that side-channel techniques aren’t limited to microchips and circuits? They’re making waves in th...
Digital Evidence: One Word But Different Objectives between CTI and DFIR
This article explores how CTI and Digital Forensics complement each other and their distinct roles in cybersecurity.
Diamond Model in the Life of a CTI Analyst
The Diamond Model isn’t just another buzzword; it’s a practical tool that empowers CTI analysts
Exploring PE Files with Python
PE files refers to **Portable Executable** files in Windows which may have any extension of the listed below
Google CTF 2019 – Beginner’s Quest: STOP GAN (pwn)
Hey folks, we got back with a nice and straightforward challenge from Google CTF beginner’s quest and it is from the ...
Camp CTF 2015 – Bitterman Write-up
This is really was an interesting challenge, it is a classic buffer overflow vulnerability but with DEP enabled and t...
Exploiting Vanilla Buffer Overflow in Vulnserver (TRUN command)
This tutorial targets beginners who want to know more about exploit development stuff and also a refresher for some e...