Skip to content

Lailatef/CTF_Target

Repository files navigation

🛡️ Cybersecurity Challenge Write-ups — Laila

This repository contains my write-ups for challenges D1–D8, covering topics from digital forensics and incident response to penetration testing and malware analysis.
Each write-up documents my approach, tools used, findings, and reflections — showcasing both technical skills and analytical thinking.


📂 Challenges

ID Challenge Title Category Skills Demonstrated
D1 Mystery Mail Email Forensics Header analysis, tracing sender IP
D2 Not-so-Simple Mail Protocol Log Analysis, SIEM Filtering logs, extracting metadata
D3 Ransom Wrangler Incident Response Negotiation tactics, threat comms
D5 Exfiltration Process Triage Host Forensics Process analysis, network connections
D6 DNS Exfil Decode Network Forensics Base32 decoding, CyberChef
D7 PCAP DNS Triage PCAP Analysis Wireshark filters, DNS exfil detection
D8 Shadow Commit Repo Forensics, Malware Git history analysis, decoding obfuscation

Note: Challenge D4 not provided in this series.


🧰 Tools & Techniques

  • Forensics: Wireshark, Autopsy, Volatility, log analysis
  • Pentesting & Enumeration: Gobuster, Nmap, subdomain enumeration scripts
  • Incident Response: Email header analysis, ransom negotiation, log correlation
  • Malware Analysis: Python decoding, base64/base32 deobfuscation, DNS exfiltration detection
  • Development: Python, Bash, Git

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published