MCMC Intervarsity Cyber Forensic Challenge 2025Date: December 13-14, 2025Event: MCMC Intervarsity Cyber Forensic ChallengeThis comprehensive writeup documents my investigation and analysis of multi...
My Journey to Malaysia Cybersecurity Camp 2025 The arrival (DAY 1)I arrive KL sentral at 9am and have some MCD before meetup with others agent and other participants which we going to port dickson ...
Problem FoundThis is a quick blog about an issue I faced with my VMware VM. Most of the time, I found that my VM can’t connect to WiFi (the ethernet connection shows up in the VM). After some inves...
First WeekProtoVault Breach Determine if the leak could have come from the application. Review the database connection string to ensure it is secure. Submit the connection string here. postgresql...
Executive SummaryThis is a Hack The Box machine writeup for Outbound. In this machine, I used nmap to discover details about the target IP address, identified a CVE affecting the Roundcube webmail...
Arm-Malaysia On Demand TrainingDay 1Introduction to ARMARM stands for Advanced RISC Machine, a family of computer processors that are widely used in mobile devices, embedded systems, and increasing...
What is Frida?Frida is a toolkit that enables dynamic interaction with running programs. Installing Frida1pip install frida-tools Then test the installation: 1frida --version Next, match your devic...
Sekure Notes (Web)Challenge DescriptionChallenge: Sekure NotesCategory: WebAuthor: vicevirusURL: http://157.180.92.15:7999/ I don’t think you are able to get the flag. The captcha is too strong :(...
IntroductionDuring a routine security intelligence exchange with my senior Ann from CyberX, I received a suspicious Android application package (APK) for analysis. The sample, disguised as a legiti...