Target Cyber Defense Challenge


Introduction

  • University of Texas at Austin
  • Computer Science, 2025
  • Digital forensics and incident response
  • Interned at CrowdStrike

Background

  • Assembly (learned ARM, but did go through some x86 on my own)
  • Prior CTF experience
  • Coding
  • Basic tools such as Wireshark
  • Programming, data structures, computer architecture, operating systems

Tier 1

  • Cryptography / Steganography
  • Reverse engineering
  • USB forensics
  • Cyber threat intelligence

Cryptography


What I learned

  • Recognizing ciphers / type of steg
  • Tools
    • Cyberchef
    • stegsolve (aperisolve/stegonline)
    • stegsnow

Reverse engineering


Bonus

![image](“images/5m1 1.jpg”) ![image](“images/a5m2 1.jpg”) ![[image](“images/a5m3 1.jpg”)


What I learned

  • x86
  • Using decompilers

USB forensics


What I learned

  • Wireshark
  • Scripting

Cyber threat intelligence


What I learned

  • VirusTotal
  • Yara
  • Learning how to read / doing research
  • CLOP
    • MOVEit

Tier 2


What I learned


Future

  • IoT Forensics Research
  • Malware analysis
  • Cryptography
  • CTF chall inspo

What I liked

  • Story – very applicable
  • Tooling
  • Collaborative
  • Perfect amount of difficulty
    • Beginner friendly
  • FUN!!!

Thoughts

  • Workshops before event?
  • Keep it collaborative

THANK YOU!!! https://www.linkedin.com/in/rebeccahuang3/ https://g0ldf15h.github.io/