Nonyx: Reverse Engineering Malware Code
Lab Scenario Exorcise Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code. You must dismantle its hooks, […]
Nonyx: Reverse Engineering Malware Code Read More »
Lab Scenario Exorcise Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code. You must dismantle its hooks, […]
Nonyx: Reverse Engineering Malware Code Read More »
Scenario Jake, a Transgear Corp Incident Response analyst, delves into an alert from Brianna, who flagged unusual activity on her
SOC: Vortex Lab Walkthrough Read More »
Scenario : Allam, a senior infrastructure engineer at EZ-CERT, is known for hosting his annual “Haunted Festival” every Halloween. This year,
Digital Forensics – Masquerade Read More »
Scenario The Account Executive contacted the Security Operations Center (SOC), reporting an inability to access files on their computer and
Digital Forensics – Memory Analysis Project: Investigating Ransomware Read More »
Overview As part of a simulated cybersecurity investigation, I worked on analyzing and mitigating a complex cyber attack targeting Haunted
Haunted : Threat Intelligence Analysis Read More »
For this lab, we want to use Windows Defender Firewall with Advanced Security to edit an existing firewall rule. We
Configuring Firewall Rules using Windows Defender Firewall with Advanced Security Read More »