This repository contains my write-ups for challenges D1–D8, covering topics from digital forensics and incident response to penetration testing and malware analysis.
Each write-up documents my approach, tools used, findings, and reflections — showcasing both technical skills and analytical thinking.
ID | Challenge Title | Category | Skills Demonstrated |
---|---|---|---|
D1 | Mystery Mail | Email Forensics | Header analysis, tracing sender IP |
D2 | Not-so-Simple Mail Protocol | Log Analysis, SIEM | Filtering logs, extracting metadata |
D3 | Ransom Wrangler | Incident Response | Negotiation tactics, threat comms |
D5 | Exfiltration Process Triage | Host Forensics | Process analysis, network connections |
D6 | DNS Exfil Decode | Network Forensics | Base32 decoding, CyberChef |
D7 | PCAP DNS Triage | PCAP Analysis | Wireshark filters, DNS exfil detection |
D8 | Shadow Commit | Repo Forensics, Malware | Git history analysis, decoding obfuscation |
Note: Challenge D4 not provided in this series.
- Forensics: Wireshark, Autopsy, Volatility, log analysis
- Pentesting & Enumeration: Gobuster, Nmap, subdomain enumeration scripts
- Incident Response: Email header analysis, ransom negotiation, log correlation
- Malware Analysis: Python decoding, base64/base32 deobfuscation, DNS exfiltration detection
- Development: Python, Bash, Git