
OverTheWire: Bandit & Leviathan Security Analysis
A Blue Team and DFIR perspective on analyzing Linux binary exploitation, privilege escalation, and logic flaws through OverTheWire's Bandit and Leviathan wargames.
Tactical reports categorized by operation type. Select a sector to filter.
Arsip writeup sedang dipindahkan ke sistem baru. Semua konten akan segera tersedia.
Access the declassified archive of previous experiments, lab notes, and early defensive protocols hosted on the old secure server.

A Blue Team and DFIR perspective on analyzing Linux binary exploitation, privilege escalation, and logic flaws through OverTheWire's Bandit and Leviathan wargames.

Analyze malware artifacts using threat intelligence platforms like VirusTotal to identify IOCs, C2 servers, and understand adversary tactics.

Investigate an insider threat by analyzing GitHub repositories for exposed credentials, using OSINT tools to correlate online accounts, and performing image analysis to identify locations.

DI Lestrade has intercepted a transmission from a criminal known as Moriarty. He's asked his good buddy Sherlock Holmes and John Watson (that's you) to use their skills as investigators to work out what he's up to.

Analisis memory dump Amadey Trojan menggunakan Volatility3 untuk mengidentifikasi proses berbahaya, komunikasi C2, pengiriman payload, dan mekanisme persistensi.
Membongkar aplikasi .NET (Activation.exe), menganalisis algoritma HMAC-SHA256 & AES, serta membuat solver otomatis.