Target IV: Cyber Threat Intelligence
Recently I completed Tier 1 of Target’s Cyber Defense Challenge offered to members of the WiCys (Women in Cybersecurity) organization. It was a CTF comprised of four categories: cryptography/steganography, reverse engineering, USB forensics, and cyber threat intelligence. In this fourth part, I will go over the challenges in the Cyber Threat Intelligence. NOTE: Some of these flags may be slightly off because I didn’t actually record the exact string that worked, but the process should be around the same...