BRONCO CTF
Hi comrades :»> I can’t explain much, so let’s get started Keyboard Elitist A;;apfkgij gj;ukd ar ut ghur war a Qwfpgj efjbyaps yk a Cyifmae uk;lg rchfmf maefr ghur iyye iuef dapbadf. Mj tpu...
Hi comrades :»> I can’t explain much, so let’s get started Keyboard Elitist A;;apfkgij gj;ukd ar ut ghur war a Qwfpgj efjbyaps yk a Cyifmae uk;lg rchfmf maefr ghur iyye iuef dapbadf. Mj tpu...
Question 1) Submit the name of the units/teams (in short form) that are responsible for maintaining network and other IT equipment, incident detection and response, and security compliance and risk...
hiii everyone (0.<) Now we will continue with the Barcode World challenge After I opened the file, I was quite shocked =)) because there were too many pictures Ok, I know it’s that much, bu...
Ok, let’s continue with the Source challenge What is the technology affected? (5 points) I will open the file zlib.c with VS code Sure, I’m a chicken in this area so I had to search everything...
I have read the questions so I can temporarily skip question 1 because I have no idea how to do it 2) What is the powershell cmdlet used to download the malware file and what is the port? (2 point...
Hi :)) Before jumping in, look at the tag and file of the article Audit.log file, go to google search, there is a tool for it yeh, there is an auditd tool lol XD sudo apt-get update sudo apt...
Question 1) How many Audit Failure events are there? (Format: Count of Events) (3 points) For the first question, we just need to search for Audit Failure to get the answer ~ You can also open ...
Hi everyone ~ Don’t forget the warning Question 1) What is the process that would be first spawned by the sample? And what is the API used? (Format: Format: process, APICall) (1 points) The ta...
Hi everyone As always let’s find out what it is Keylogger is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware th...
You can understand Ransomware is a type of cryptovirological malware that permanently block access to the victim’s personal data unless a ransom is paid. Ok, now let’s get into the challenge Don’...