Skip to content (Press Enter)
  • Home

Ghetto Forensics

  • Home

Year: 2016

Running the Labyrenth: Unit 42 CTF

August 16, 2016May 20, 2025 Brian Baskin

At least once a year I try to publish my work process for a Capture The Flag (CTF) event. If you’re not familiar with CTFs, they’re a timed challenge of very difficult or obscure challenges to gain a “flag” to submit for points. Some enjoy these, some feel them a waste of time. At the …

Read More

GrrCon 2015 – Memory Forensics – Grabbing all the Flags…

May 2, 2016May 20, 2025 Brian Baskin

Today we bring you a special guest posting by Tony “@captcook32” Cook. Late last year GrrCon hosted their anticipatory excellent set of challenges which included an in depth memory forensics challenge by Wyatt Roersma. Tony and myself took a few days on a down week to try our hand at the challenge. I lacked the …

Read More

Of Malware and Adware: Why Forbes Did Not Serve Me Malware

March 16, 2016May 20, 2025 Brian Baskin

The topic of web-based advertising is always a hot topic for discussion, debate, and outright argument. One realizes that the Internet in which we’ve grown accustomed to is reliant on ads; after all, Google is an advertisement company. In the recent past we’ve seen articles on malvertising targeted using Skype and more recently using the New York …

Read More

Creating a Malware Sandbox in Seconds with Noriben.

January 18, 2016May 20, 2025 Brian Baskin

Happy New Years! As part of the new year, let’s make an effort to make your defensive posture better, especially through quicker and more effective malware analysis! A few years ago I created a sample malware analysis sandbox script to use for the analysis and reverse engineering that I performed on a daily basis. Let’s …

Read More

Search

Archive List

  • March 2024
  • November 2022
  • March 2018
  • July 2017
  • August 2016
  • May 2016
  • March 2016
  • January 2016
  • September 2015
  • November 2014
  • September 2014
  • February 2014
  • January 2014
  • October 2013
  • September 2013
  • August 2013

Recent Posts

  • Huntress CTF 2023 – Unique Approaches to Fun Challenges
  • Flare-On 9 – The Worst Writeups
  • Enforcing the Law at the Mid Atlantic Collegiate Cyber Defense Competition (MACCDC)
  • Exploring the Labyrenth (2017 Edition)
  • Running the Labyrenth: Unit 42 CTF

Categories

  • Uncategorized

Archive List

  • March 2024
  • November 2022
  • March 2018
  • July 2017
  • August 2016
  • May 2016
  • March 2016
  • January 2016
  • September 2015
  • November 2014
  • September 2014
  • February 2014
  • January 2014
  • October 2013
  • September 2013
  • August 2013

Recent Posts

  • Huntress CTF 2023 – Unique Approaches to Fun Challenges
  • Flare-On 9 – The Worst Writeups
  • Enforcing the Law at the Mid Atlantic Collegiate Cyber Defense Competition (MACCDC)
  • Exploring the Labyrenth (2017 Edition)
  • Running the Labyrenth: Unit 42 CTF

Categories

  • Uncategorized

Tags

.net behavior analysis bsidesdc bsidesde cafebabe challenge class ctf cybergamut debugger dfir dynamic analysis encryption fernflower forensics gmail google ida infected infosec jad jar java jd-gui jdo jmd krakatau malware malware analysis matasano memory microsoft Noriben plaso privacy procmon python reverse engineering runtime security shedexec sysinternals trojan volatility windows
© 2025 Ghetto Forensics. All Rights Reserved. Prime Cyber Security By Themeignite. Powered By WordPress.