<- HTB CHALLENGES

Forensics - Total: 30

Urgent
CTF

Urgent

Email message analysis. Base64 and URL encodings. VBScript
An unusual sighting
CTF

An unusual sighting

Linux. Log analysis
Valhalloween
CTF

Valhalloween

Windows event logs. chainsaw
Scripts and Formulas
CTF

Scripts and Formulas

VBS script. PowerShell. Windows Event logs
Red Miners
CTF

Red Miners

Bash. Base64
Illumination
CTF

Illumination

Git enumeration. Base64 encoding
Keep Tryin'
CTF

Keep Tryin'

Network traffic analysis. DNS queries. RC4
Automation
CTF

Automation

HTTP and DNS traffic analysis. PowerShell. AES cipher
Packet Cyclone
CTF

Packet Cyclone

Rclone and chainsaw. Windows event logs
Extraterrestrial Persistence
CTF

Extraterrestrial Persistence

Shell script analysis
Alien Cradle
CTF

Alien Cradle

PowerShell deobfuscation
MarketDump
CTF

MarketDump

Network traffic analysis. Telnet
Export
CTF

Export

Memory dump analysis
Interstellar C2
CTF

Interstellar C2

Network traffic analysis. PowerShell deobfuscation. C# .NET decompilation. Steganography. AES cipher
Relic Maps
CTF

Relic Maps

Malware analysis. Batch and PowerShell deobfuscation. AES cipher. C# .NET decompilation
Artifact Of Dangerous Sighting
CTF

Artifact Of Dangerous Sighting

Disk image. Alternate Data Streams. PowerShell deobfuscation
Deadly Arthropod
CTF

Deadly Arthropod

USB HID analysis. Decoding key strokes
Peel Back The Layers
CTF

Peel Back The Layers

Docker image inspection. Shared library analysis
Logger
CTF

Logger

USB HID analysis. Decoding key strokes
Insider
CTF

Insider

Firefox files inspection. Credentials decryption
No Place To Hide
CTF

No Place To Hide

Windows RDP image recovery
Lure
CTF

Lure

Word macros deobfuscation
Event Horizon
CTF

Event Horizon

Windows event logs
Free Services
CTF

Free Services

Excel macros deobfuscation
Fake News
CTF

Fake News

PHP and JavaScript deobfuscation. Disc image inspection
Downgrade
CTF

Downgrade

Windows event logs. XML filters
POOF
CTF

POOF

Network traffic analysis with Wireshark. Binary analysis
Halloween Invitation
CTF

Halloween Invitation

Microsoft Office VBA macros deobfuscation
Wrong Spooky Season
CTF

Wrong Spooky Season

Network traffic analysis with Wireshark
Chase
CTF

Chase

HTTP and TCP traffic analysis