Let's Defend - PCAP Analysis

Description We captured this traffic from P13's computer so can you help him? Tools 1- Wireshark 2- OSINT Tools 3- Reverse engineering 4- Python scripting Writeup Q1 in this challenge I got a network traffic. so let’s openit and investigate that traffics. As we can see there are 25,262 packets so let’s filter the streams to TCP protocols and check if there is anything suspicious. Okay got 7780 stream so let’s check the whole stream and find something interesting....

February 12, 2024 · 4 min · MMOX

Let's Defend - Malicious Chrome Extension

Description The victim found out their private info was out there for everyone to see, and things got worse – the bad guys got into their money stuff, social media, and personal emails. We got an image of his machine so you can tell us what happened. Tools Tools Required 1- FTKimger 2- Notepad++ 3- DB Browser for SQLite Writeup From the challenge description, we can see that the victim’s PII was stolen....

January 26, 2024 · 2 min · MMOX

Let's Defend - Windows Memory Dump

Description Our friend fell victim to a suspicious crack tool. but it seems it didn't goes in the right path so investigate it to find any evidence. Tools Tools Required 1- Volatility 2- Notepad++ 3- VirusTotal or VM. 4- Linux Command Line Writeup Q1 How many users are on the machine? In this question we can use filescan then grep the Users and sort them and find the uniq...

January 3, 2024 · 3 min · MMOX

Let's Defend - WinRAR 0-Day

Description It seems there are many cracks for famous game. but it seems we downloaded the wrong one because it has a suspicious behavior and we need you to investigate it. Tools Tools Required 1- Volatility3 2- Notepad++ 3- Cyberchef 4- Exiftool | Metadata viewer Writeup Q1 What is the suspected process? Well we got a memory dump and we need to locate the suspicious process. so let’s use volatility to go through this challenge....

August 28, 2023 · 3 min · MMOX

Let's Defend - Cl0p

Description Our friend fell victim to a ransomware attack and reached out to seek your expertise in analyzing the system to uncover the cause of the breach. We have provided you with a memory dump of his computer as the starting point for your investigation. Tools Tools Required 1- Volatility 2- Notepad++ 3- VirusTotal or VM. Writeup Q1 What is the dump profile? Well by checking the file we got it’s a memory dump so we are going to use volatility in this case for our investigations....

July 25, 2023 · 3 min · MMOX