Holiday Hack Challenge 2022 Writeup —Stage 6— Recover the Burning Ring of FireThis is the last challenge and the one I looked forward the most. It involves heavy interaction with NFT which is a new topic to me. All…Jan 7, 2023Jan 7, 2023
Holiday Hack Challenge 2022 Writeup — Stage 4 — Recover the Web RingYou are asked to talk to Alabaster Snowball immediately after entering Web Ring. There are total 3 challenges before you could recover the…Jan 7, 2023Jan 7, 2023
Holiday Hack Challenge 2022 Writeup — Stage 5— Recover the Cloud RingAWS CLI IntroJan 7, 2023Jan 7, 2023
Holiday Hack Challenge 2022 Writeup — Stage 3 — Recover the Elfen RingAfter finishing the Elfen ring, I immediately jumped into the Elfen Ring realm. This is one of the realm that I found interesting as it…Jan 7, 2023Jan 7, 2023
Holiday Hack Challenge 2022 Writeup — Stage 2— Recover the Tolkien RingStage 2— Recover the Tolkien RingJan 7, 2023Jan 7, 2023
Would use of GAL trigger any Event Log?There were a few cases I have recently working on and was asked by the user whether a subject has used Global Address List (“GAL”) in…Jul 26, 2022Jul 26, 2022
Linux/Docker Forensic ToolsResources related to Linux Forensic are very limited. I have created a list of tools and presentations I found useful for Linux/Docker…Aug 6, 2021Aug 6, 2021
Windows Sticky Notes ForensicsHave you ever responded to an incident where you are required to look for sticky notes attached to your computer? Limited documentation was…Jun 30, 20211Jun 30, 20211
Step by Step Guide on setting up SMB, RDP, SSH and HTTP HoneyPot in Raspberry PiHoneyPot attempts to offer a reliable indicator of compromise with little to no setup or maintenance costs. It could also provide a wealth…Apr 28, 2021Apr 28, 2021