PinnedElaine HungHoliday Hack Challenge 2022 Writeup — Stage 1 — OrientationIntroduction4 min read·Jan 7, 2023----
Elaine HungHoliday Hack Challenge 2022 Writeup —Stage 6— Recover the Burning Ring of FireThis is the last challenge and the one I looked forward the most. It involves heavy interaction with NFT which is a new topic to me. All…11 min read·Jan 7, 2023----
Elaine HungHoliday Hack Challenge 2022 Writeup — Stage 4 — Recover the Web RingYou are asked to talk to Alabaster Snowball immediately after entering Web Ring. There are total 3 challenges before you could recover the…19 min read·Jan 7, 2023----
Elaine HungHoliday Hack Challenge 2022 Writeup — Stage 5— Recover the Cloud RingAWS CLI Intro8 min read·Jan 7, 2023----
Elaine HungHoliday Hack Challenge 2022 Writeup — Stage 3 — Recover the Elfen RingAfter finishing the Elfen ring, I immediately jumped into the Elfen Ring realm. This is one of the realm that I found interesting as it…11 min read·Jan 7, 2023----
Elaine HungHoliday Hack Challenge 2022 Writeup — Stage 2— Recover the Tolkien RingStage 2— Recover the Tolkien Ring8 min read·Jan 7, 2023----
Elaine HungWould use of GAL trigger any Event Log?There were a few cases I have recently working on and was asked by the user whether a subject has used Global Address List (“GAL”) in…1 min read·Jul 26, 2022----
Elaine HungLinux/Docker Forensic ToolsResources related to Linux Forensic are very limited. I have created a list of tools and presentations I found useful for Linux/Docker…1 min read·Aug 6, 2021----
Elaine HungWindows Sticky Notes ForensicsHave you ever responded to an incident where you are required to look for sticky notes attached to your computer? Limited documentation was…3 min read·Jun 30, 2021----
Elaine HungStep by Step Guide on setting up SMB, RDP, SSH and HTTP HoneyPot in Raspberry PiHoneyPot attempts to offer a reliable indicator of compromise with little to no setup or maintenance costs. It could also provide a wealth…9 min read·Apr 28, 2021----