Mother Teaching Analysis Writeup
ANALYSIS AND INSIGHTS REPORT Co-Author: Daphnie N. Costa Eastern Visayas State University Project Background Executive Summary Insights Deep-Dive Linguistic Environment ...
ANALYSIS AND INSIGHTS REPORT Co-Author: Daphnie N. Costa Eastern Visayas State University Project Background Executive Summary Insights Deep-Dive Linguistic Environment ...
This is a solution submitted to the crackmes.one challenge by BitFriends Challenge Description Author: BitFriends Language: Assembler Upload: 7:05 PM 04/25/2020 Platform: Unix/linux Difficulty: 1.0...
This is a solution submitted to the crackmes.one challenge by b4te Challenge Description Author: b4te Language: C/C++ Upload: 2:27 PM 05/12/2024 Platform: Unix/linux Difficulty: 1.1 Quality: 3.8 A...
In today’s digital landscape, network security is a critical concern for organizations and individuals. Cyberattacks are becoming increasingly sophisticated, making it essential to detect and mitig...
Overview What drives terrorism trends across the globe? The Global Terrorism Database (GDT) holds the answers, tracking over 200,000 incidents worldwide. The goal is to uncover patterns in hotspot...
Scenario In this very easy Sherlock, you will familiarize yourself with Unix auth.log and wtmp logs. We’ll explore a scenario where a Confluence server was brute-forced via its SSH service. After g...
Scenario As a cybersecurity analyst for a leading financial institution, an alert from your SIEM solution has flagged unusual activity on an internal workstation. Given the sensitive financial dat...
Sherlock Scenario The IDS device alerted us to a possible rogue device in the internal Active Directory network. The Intrusion Detection System also indicated signs of LLMNR traffic, which is un...
Scenario Eric Fischer from the Purchasing Department at Bartell Ltd has received an email from a known contact with a Word document attachment. Upon opening the document, he accidentally clicked ...
Crackme1 Let’s start with a basic warmup, can you run the binary? Make the permission of the binary to executable then run it. Crackme2 Find the super-secret password! and use it to obtain t...