Digital Forensics & Incident Response
Search
⌃K
Digital Forensics & Incident Response
Search
⌃K
Welcome
General Notes
Install and Configure ZeroTier client
S3FS Fuse and MinIO
Enable nested VT-X/AMD-V
mitm proxy
Exploring Volume Shadow Copies Manually
Resize VMDK/VDI
Resize VMDK on ESXi
Convert raw to vmdk
Favicon hashing and hunting with Shodan
WinRM/RemotePS
MinIO/S3/R2 ghost files
Microsoft Defender KQL
Introduction to KQL
Windows Forensics
PsExec
Security Patch/KB Install Date
Linux Forensics
Inspecting RPM/DEB packages
Common Locations
ESXi Forensics
Understanding ESXi
General Notes
Triage and Imaging
ESXi VMFS Exploration
Export OVF from ESXi using OVF Tool
Identification, acquisition, and examination of iSCSI LUNs and VMFS datastores
Memory Forensics
Volatility
Acquisition
Incident Response
VirusTotal & hash lists
Unix-like Artifacts Collector (UAC)
Acquiring Linux VPS via SSH
AVML dump to SMB / AWS
China Chopper webshell
Logging Powershell activities
Compromised UniFi Controller
AnyDesk Remote Access
iOS Forensics
Checkm8 / checkra1n acquisitions/extractions
CTF / Challenges
DEFCON 2019 forensics
Tomcat shells
Magnet Weekly CTF
Magnet CTF Week 0
Magnet CTF Week 1
DFIR Madness CTF
Log Files
Windows
Malware Analysis
PDF Analysis
Walking the VAD tree
OpenCTI
What is CTI/OpenCTI?
Setting up OpenCTI
Container Management
Configure Connectors
Vulnerability Management
Setting Up Nessus (Essentials)
Troubleshooting
Privacy
Powered By
GitBook
Magnet Weekly CTF
Magnet Forensics are offering a weekly CTF challenge with a focus on digital forensics. More information can be found on their blog. Each CTF write up written on its own page.
https://www.magnetforensics.com/blog/magnet-weekly-ctf-challenge/
CTF / Challenges - Previous
Tomcat shells
Next
Magnet CTF Week 0
Last modified
2yr ago