Open in app

Sign In

Write

Sign In

Ellis Stannard
Ellis Stannard

88 Followers

Home

About

Nov 3, 2022

CyberDefenders: Szechuan Sauce CTF Writeup

Another CTF with CyberDefenders; Rick & Morty forensics challenges courtesy of DFIRMadness. #1 What’s the Operating System version of the Server? (two words)

Forensics

10 min read

CyberDefenders: Szechuan Sauce CTF Writeup
CyberDefenders: Szechuan Sauce CTF Writeup
Forensics

10 min read


Jan 8, 2022

SANS KringleCon 2021 — Printer Exploitation (Hash Extension Attack)

Hello all and Happy New Year! This is a writeup for the fourth Holiday Hack Challenge from SANS, KringleCon 4: Calling Birds. This will be specifically for the challenge Printer Exploitation using a Hash Extension Attack. To start this challenge, enter Jack Frost’s Office:

Cybersecurity

12 min read

SANS KringleCon 2021 — Printer Exploitation (Hash Extension Attack)
SANS KringleCon 2021 — Printer Exploitation (Hash Extension Attack)
Cybersecurity

12 min read


Aug 4, 2021

Malware Traffic Analysis 3

Malware Traffic Analyses are a set of CTF challenges for analysing traffic and an excellent way of developing threat hunting using tools like Wireshark and Suricata. Here we do their third CTF challenge, analysing a PCAP from an infected machine. This can be downloaded from the Cyber Defenders page here. …

8 min read

Malware Traffic Analysis 3
Malware Traffic Analysis 3

8 min read


Jun 22, 2021

OSINTifying Targets

Hello folks, it’s been a while but today I’m going to show you how to OSINTify targets based on different types of attacks. From this exercise it was alarming how much information was gathered. …

Osint

19 min read

OSINTifying Targets
OSINTifying Targets
Osint

19 min read


Jun 3, 2021

SANS SEC504: Hacker Tools, Techniques, Exploits and Incident Handling — Course Review (2021)

SANS provide a very clear pathway for Incident Response in their Cyber Security Map Pathway, starting off with SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling. Having literally just passed the GCIH (GIAC Certified Incident Handler) exam which complements the course, thought it only fair to share my views on the training, materials, labs and exam itself. I was fortunate enough to be selected for the Work-Study program — this was designed to give participants a discounted pass in exchange for acting as a moderator of the classes. Given this was still during the height of the COVID-19 pandemic, this was done remotely and involved helping anyone…

Gcih

8 min read

SEC504: Hacker Tools, Techniques, Exploits and Incident Handling — Review (2021)
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling — Review (2021)
Gcih

8 min read


Jan 11, 2021

SANS Kringlecon 2020 — ARP Shenanigans Writeup

It’s that time of the year again; the 2020 SANS Holiday Hack Challenge, featuring KringleCon 3: French Hens! This year’s event had a total of 12 challenges with a wide range of activities, mainly Penetration Testing boxes although others such as Threat Hunting, Cryptography and even a bit of JavaScript training. There were many different tools provided within each challenge environment (such as Splunk, Amazon S3 bucket finders, CAN BUS traffic monitoring) requiring some foundational knowledge, alongside external research. As such, this is a writeup for Objective 9 — ARP Shenanigans.

Hacking

15 min read

SANS Kringlecon 2020 — ARP Shenanigans
SANS Kringlecon 2020 — ARP Shenanigans
Hacking

15 min read


Dec 11, 2020

Practical Malware Analysis — Chapter 6 Labs

Practical Malware Analysis is a book introducing fundamental and advance analysis of malware both statically and dynamically. Today, we work through the Practical Malware Analysis exercises in Chapter 6 — Recognising C Code Constructs in Assembly Language. This chapter if you haven’t guessed is for helping understand what is going…

Malware

12 min read

Practical Malware Analysis — Chapter 6 Labs
Practical Malware Analysis — Chapter 6 Labs
Malware

12 min read


Nov 28, 2020

MalwareTech Malware Reversing Challenges — Ransomware

Here we are with another of the malware reverse engineering challenges from MalwareTech — this time Ransomware. These are static analysis challenges and therefore require a disassembler and not a debugger or dumper. Presumably most people reading this will be using the article as guidance. …

Ransomware

4 min read

MalwareTech Malware Reversing Challenges — Ransomware
MalwareTech Malware Reversing Challenges — Ransomware
Ransomware

4 min read


Nov 11, 2020

MalwareTech Malware Reversing Challenges — Hide and Seek (Strings)

Hello folks, we’re here for some more CTF challenges — this time malware reverse engineering. MalwareTech (aka Marcus Hutchins) is a computer researcher and malware analyst, if his alias hadn’t helped you guess, who is famous for stopping the infamous WannaCry ransomware, which affected (and infected) over 200,000 devices, in…

Reverse Engineering

4 min read

MalwareTech Malware Reversing Challenges — Strings
MalwareTech Malware Reversing Challenges — Strings
Reverse Engineering

4 min read


Oct 15, 2020

MemLabs Writeup using Volatility Labs 4–6

Here we continue with the MemLabs CTFs… Lab 4 — Obsession: My system was recently compromised. The Hacker stole a lot of information but he also deleted a very important file of mine. I have no idea on how to recover it. The only evidence we have, at this point of time is this memory dump. …

Ctf

10 min read

MemLabs CTF Using Volatility Labs 4–6
MemLabs CTF Using Volatility Labs 4–6
Ctf

10 min read

Ellis Stannard

Ellis Stannard

88 Followers

Digital Forensics, Incident Response and Threat Hunting things.

Following
  • PCMag

    PCMag

  • Cyber Safety Guy

    Cyber Safety Guy

  • daviesombasa

    daviesombasa

  • Thomas Roccia

    Thomas Roccia

  • Leonardo M. Falcon

    Leonardo M. Falcon

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech