Recent posts

Detecting NTDS.dit Dumping

In this blog post, we’ll dive into how attackers use NTDSUTIL to dump the NTDS.dit file, and how you, as a defender, ...

4 minute read

Side Channel Attacks: Not Just Hardware Tricks—They’re Spilling into Cyber Threat Intelligence!

What if I told you that side-channel techniques aren’t limited to microchips and circuits? They’re making waves in th...

2 minute read

Digital Evidence: One Word But Different Objectives between CTI and DFIR

This article explores how CTI and Digital Forensics complement each other and their distinct roles in cybersecurity.

2 minute read

Diamond Model in the Life of a CTI Analyst

The Diamond Model isn’t just another buzzword; it’s a practical tool that empowers CTI analysts

4 minute read

Exploring PE Files with Python

PE files refers to **Portable Executable** files in Windows which may have any extension of the listed below

7 minute read

Google CTF 2019 – Beginner’s Quest: STOP GAN (pwn)

Hey folks, we got back with a nice and straightforward challenge from Google CTF beginner’s quest and it is from the ...

4 minute read

Camp CTF 2015 – Bitterman Write-up

This is really was an interesting challenge, it is a classic buffer overflow vulnerability but with DEP enabled and t...

9 minute read

Exploiting Vanilla Buffer Overflow in Vulnserver (TRUN command)

This tutorial targets beginners who want to know more about exploit development stuff and also a refresher for some e...

8 minute read