Target I: Cryptography and Steganography

Recently I completed Tier 1 of Target’s Cyber Defense Challenge offered to members of the WiCys (Women in Cybersecurity) organization. It was a CTF comprised of four categories: cryptography/steganography, reverse engineering, USB forensics, and cyber threat intelligence. In this first part, I will go over the challenges in the cryptography / steganography section. Beware the Ides of March 100 points You have intercepted the following message from the threat actor! Decrypt the message to reveal the secret phrase:...

<span title='2023-07-07 00:00:00 +0000 UTC'>July 7, 2023</span>

Target II: Reverse Engineering

Recently I completed Tier 1 of Target’s Cyber Defense Challenge offered to members of the WiCys (Women in Cybersecurity) organization. It was a CTF comprised of four categories: cryptography/steganography, reverse engineering, USB forensics, and cyber threat intelligence. In this second part, I will go over the challenges in the reverse engineering section. In my opinion, this was the most technical challenge as knowledge of basic assembly (x86) and the C programming language was required....

<span title='2023-07-07 00:00:00 +0000 UTC'>July 7, 2023</span>

Target III: USB Forensics

Recently I completed Tier 1 of Target’s Cyber Defense Challenge offered to members of the WiCys (Women in Cybersecurity) organization. It was a CTF comprised of four categories: cryptography/steganography, reverse engineering, USB forensics, and cyber threat intelligence. In this third part, I will go over the challenges in the USB forensics section. Challenges Find the Blue Yeti 100 points We believe that while one of the ransomware operators was out in public they dropped this USB device....

<span title='2023-07-07 00:00:00 +0000 UTC'>July 7, 2023</span>

Target IV: Cyber Threat Intelligence

Recently I completed Tier 1 of Target’s Cyber Defense Challenge offered to members of the WiCys (Women in Cybersecurity) organization. It was a CTF comprised of four categories: cryptography/steganography, reverse engineering, USB forensics, and cyber threat intelligence. In this fourth part, I will go over the challenges in the Cyber Threat Intelligence. NOTE: Some of these flags may be slightly off because I didn’t actually record the exact string that worked, but the process should be around the same...

<span title='2023-07-07 00:00:00 +0000 UTC'>July 7, 2023</span>