PinnedThe one writeup to rule them all. LetsDefend malware analysis all in one writeupThis write up is for LetsDefend Malware analysis challenges and is for education purposes only. I hope it will be clear and easy to use for…Mar 5, 2023Mar 5, 2023
Obfuscated — CyberDefenders ChallengeWelcome back to another writeup, this time we are going to analyze an obfuscated file and answer some questions about it.Aug 16, 2023Aug 16, 2023
Let’s Defend writeup — Suspicious Browser ExtensionDescription: A person working in the accounting department wanted to add a browser extension, but it was deleted from his device because…Mar 8, 2023Mar 8, 2023
Let’s Defend writeup — MSHTMLDescription: We are going to analyze 2021’s 0-Day MSHTMLMar 8, 20231Mar 8, 20231
Let’s Defend Writeup — Excel 4.0 MacrosDescription: One of the employees has received a suspicious document attached in the email. When the e-mail flow is examined, it is seen…Mar 8, 2023Mar 8, 2023
Let’s Defend writeup — PDF AnalysisDescription: The employee has reported this incident to you as the analyst which has also forwarded the attachment to your SIEM. They have…Mar 8, 2023Mar 8, 2023
Let’s Defend Writeup — Malicious VBADescription: One of the employees has received a suspicious document attached in the invoice email. They sent you the file to investigate…Mar 8, 2023Mar 8, 2023
Let’s Defend writeup — Presentation As a MalwareDescription: Analyzing a .ppt(powerpoint presentation) fileMar 8, 2023Mar 8, 2023