BHIS Webcast CTF 10-2-2025
Part 1: Prompt: In this post-webcast challenge, we are going to be looking into a malicious .eml file.` Seriously, one would think we would have solved the whole email as an attack vector thing. ...
Part 1: Prompt: In this post-webcast challenge, we are going to be looking into a malicious .eml file.` Seriously, one would think we would have solved the whole email as an attack vector thing. ...
Introduction: In today’s cloud-driven world, Multi-Factor Authentication (MFA) has become the gold standard for securing Microsoft 365 accounts. While it blocks most traditional phishing attempts,...
Introduction: In January 2025, Fortinet disclosed CVE-2024-55591, a critical authentication bypass vulnerability affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.0.0 through 7.0.19 / 7.2.0 ...
Sherlock Scenario: In this Sherlock, you will familiarize yourself with Sysmon logs and various useful EventIDs for identifying and analyzing malicious activities on a Windows system. Palo Alto’s ...
Keeper is a simple machine focused on a helpdesk running Request Tracker with an admin running KeePass for password management. Default creds allow for the reconnaissance necessary to achieve init...