-->
CTF on a Budget - Magnet User Summit 2018 (Part 3)

For part 3, we are looking at the exfiltration section. Previously: Part 1 (Misc)  | Part 2 (Anti-Forensics) Exfiltration 1. Application for Exfil:  Which application was used to exfiltrate data on the compromise…

CTF on a Budget - Magnet User Summit 2018 (Part 2)

In part 1 we broke down the answers to the Miscellaneous category .As we continue on through the Magnet User Summit 2018 CTF we now get to the Anti-Forensics section.In this section I got to use some different free tools as…

CTF on a Budget - Magnet User Summit 2018 (Part 1)

Last year during the Magnet User Summit, I was able to participate in the excellent CTF from Dave and Matt of G-C Partners. I had so much fun and learned a lot from doing it but I wanted to revisit it before it gets shut dow…

Shellbags, Folder Views, and Windows Explorer

I always enjoy working on a Sunday Funday challenge from Dave that I can actually do (I'm terrible at scripting). So I decided to do some research and see what I could find. It's been well documented just how she…

Tech Tuesday: Aukey LC-C6 Wireless Charger

Another Tech Tuesday and another Aukey product. This time we will be looking at their LC-C6 wireless fast charger. It comes in Aukey's standard beige flip top package. The contents include the charging pad, a micro …