I Started Playing CTFs and They Are My New Hobby

At its core, a CTF is both a learning tool and a game, making it a fun and interactive way to dive into cybersecurity, whether you’re a beginner or a seasoned professional. CTFs usually come in three categories: Jeopardy-style, Attack-defense, and Mixed or King of the Hill.

JPCERT shares Windows Event Log tips to detect ransomware attacks

The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.

Top 10 Open-Source Intelligence Tools (OSINT)

OSINT tools help access, collate, and organize relevant data based on queries within the various tools. Organizations wanting to develop an OSINT practice should consider what approach they should take when leveraging these tools.

50 basic Linux commands – DEV Community

Here are 50 basic Linux commands that are useful for navigating and managing your system:

Extracurriculars Matter To You and To Colleges – BigFuture

High school is a time to try new things, learn new skills, and develop new passions. While grades and test scores are important, colleges also want to see the person you’re becoming and the skills you’ve learned outside of class. They want to know what makes you unique, and the extracurricular activities you participate in will help you stand out.

Hacking Made Easy: A Beginner’s Guide to Penetration Testing with Kali Linux | Linux Journal

Kali Linux is an open source, Debian-based Linux distribution developed and maintained by Offensive Security. It is designed for digital forensics and penetration testing and comes pre-installed with a vast array of security tools.

pico Information – cat photo

This one seemed easy, then turned out to be more difficult than originally thought. Most people were looking for the flag in the image properties and information. However, most people…

pico Speeds and Feeds

This is is easy to overlook even if you get the code from the hint. First step, take a look at the hint. This is where doing some research on…

pico Wireshark doo do dooo do

This one is a bit more challenging and can be tedious for those who have not used Wireshark. Download the pcap file. Open Wireshark from the C:\APPS\CTF\NETWORKING folder on your…

pico Tab Tab Attack

This required me to unzip the file. Get to the final file and use the Open With option. The program to open this is bintext app in the following folder…