Setting Up a Virtual Malware Analysis Lab
Introduction In this lab, we will build a safe and controlled virtual environment for malware analysis using VirtualBox and a Windows 10 virtual machine. The goal is to configure an isolated syste...
Introduction In this lab, we will build a safe and controlled virtual environment for malware analysis using VirtualBox and a Windows 10 virtual machine. The goal is to configure an isolated syste...
Introduction Challenge Link: Investigating Windows Investigate a compromised Windows machine to determine the actions taken by the attacker System Information View the system inforamtion that w...
The Crime Lab Challenge Link: The Crime Utilize ALEAPP to analyze Android device artifacts, reconstructing a victim’s financial details, movements, and communication patterns. Scenario We’re cu...
Introduction Challenge Link: Sysinternals Conduct endpoint forensic analysis to detect, analyze, and understand malware infections using disk images, registry artifacts, and threat intelligence. ...
Introduction Challenge Link: Insider Analysis Linux artifacts, including logs and Bash history, using FTK Imager to investigate insider threat activities and reconstruct user actions. Downloa...
Introduction Challenge Link: mustacchio Easy boot2root Machine Enumeration Start with port scanning nmap 10.10.236.200 -sV -sC Starting Nmap 7.95 ( https://nmap.org ) at 2025-09-10 22:05 +03...
Introduction Challenge Link: Cicada3301vol1 A basic steganography and cryptography challenge room based on the Cicada 3301 challenges Analyze the Audio Use Sonic Visualizer to analyze the audio...
Introduction Challenge Link: Brooklyn Nine Nine The challenge described that there are two ways to hack into the machine, I tried both ways. Steganography Start with port scanning nmap 10.10.1...
Introduction Challenge Link: Event Horizon Join Tom and Dom on a quest to find out what happens when you look beyond the Event Horizon. A quest beyond borders, they need you to utilize all your a...
Introduction Challenge Link: Warzone 2 An alert triggered: Misc activity, A Network Trojan Was Detected, and Potential Corporate Privacy Violation. Inspect the PCAP and retrieve the artifacts to ...