SEC-T CTF’17 G1bs0n WriteUp

This was one of the better memory forensics challenges that I tried and solved. There was not much of a big depth in this challenge but however, it tries to teach you the basic plugins of volatility. Though the writeup may look very clean and straight-forward, I was at sixes and sevens while trying out... Continue Reading →

Advertisements

BsidesSF’17 CTF DNScap Write-Up

This was one of the exciting challenges that I solved lately. I'd even recommend this challenge to everyone who is interested in learning Network Forensics and more about the scapy module of python. So enough talk, let us get on with the challenge. Challenge Description: "Found this packet capture. Pretty sure there's a flag in here.... Continue Reading →

InCTF 2018 Evil Crypter Writeup

I had a lot of fun organizing this year's CTF. This was also my first time organizing a CTF. Working along with my teammates, for roughly 36hrs, talking to various people in the IRC was a lot of fun. I made two challenges this year EvilCrypter and Winter Sport. I really expected a lot of teams to solve this... Continue Reading →

The Volatility Framework

Volatility is a python based command line tool that helps in analyzing virtual memory dumps. It provides a very good way to understand the importance as well as the complexities involved in Memory Forensics. Advantages of using Volatility: Runs on Windows, Linux and Mac It can be executed wherever python environment is present. Uses Fast... Continue Reading →

Basics Of Memory Forensics

What is Volatile Memory? Volatile Memory is the memory used by the system or OS during the time the device is powered on. To put it simply, the data stored in RAM(Random Access Memory) can be called as volatile memory. It is also called the primary memory. So, why do we need to analyze memory? For... Continue Reading →

Powered by WordPress.com.

Up ↑

Create your website at WordPress.com
Get started