Day 2 of the No-AI challenge: exploring blue team tactics, DFIR, and network forensics using Wireshark.
Day 3 of the No-AI challenge: focusing on initial malware analysis and malicious script deobfuscation.
Day 4 of the No-AI challenge: analyzing the Obfuscated malware challenge and verifying file hashes.
themes