Faishol HakiminMII Cyber Security Consulting ServicesNahamcon-CTF 2024 — Forensic (1)Last week, I participated in the NahamCon 2024 CTF, focusing specifically on the forensic challenges. These challenges are designed to…Jun 3Jun 3
Faishol HakiminMII Cyber Security Consulting ServicesTenable CTF 2023 — Tenable PublicationTenable PublicationSep 6, 2023Sep 6, 2023
Faishol HakiminMII Cyber Security Consulting ServicesInvestigating Malicious Document FileMalicious Excel files have been a popular vector for delivering malware, phishing, and other types of cyberattacks. Excel files are…Apr 3, 2023Apr 3, 2023
Faishol HakiminMII Cyber Security Consulting ServicesWolvctf2023: WannaFlag Series 1–3This week I participated in the CTF event organized by WolvSec. In this event, I only focused on the forensic and OSINT challenges. In this…Mar 21, 2023Mar 21, 2023
Faishol HakiminMII Cyber Security Consulting ServicesMemory Forensic — Linux Kernel ConfusionMemory forensics is one of the sub-categories of digital forensics that I usually find in ctf competitions. Where it is necessary to…Mar 6, 2023Mar 6, 2023
Faishol HakiminMII Cyber Security Consulting ServicesNetwork Forensic — SMUX ProtocolThis topic come from one of the digital forensics category challenges held by Autobahn Security. This time I will discuss the category of…Mar 5, 2023Mar 5, 2023
Faishol HakimFollina: Incident ResponseFollina or known and listed as CVE-2022–30190 is one of latest famous vulnerability that revealed on May 2022. This vulnerability affect…Jun 18, 2022Jun 18, 2022
Faishol HakiminSystem WeaknessNahamCon CTF 2022: OSINT ChallengeNahamCon CTF 2022 is a gamified cyber security event and part of free virtual security conference Hosted by STOK, John Hammond and…May 8, 20221May 8, 20221
Faishol HakimSimple Step Applying CIS Benchmark Hardening: Ubuntu ServerHardening sering terdengar dalam dunia teknologi informasi yang bila dibahasakan memiliki makna pengerasan, ini sejalan dengan proses yang…Mar 17, 2022Mar 17, 2022
Faishol HakimBTLO: SPECTRUM(Audio Steganography)Steganography is the art of concealing a message, image, or file within another message, image, or file, so, audio steganography is a…Feb 13, 20222Feb 13, 20222