Open in app

Sign In

Write

Sign In

Faishol Hakim
Faishol Hakim

31 Followers

Home

Lists

About

Published in

MII Cyber Security Consulting Services

·Sep 6

Tenable CTF 2023 — Tenable Publication

Tenable Publication Start your Engine

Cybersecurity

4 min read

Tenable CTF 2023 — Tenable Publication
Tenable CTF 2023 — Tenable Publication
Cybersecurity

4 min read


Published in

MII Cyber Security Consulting Services

·Apr 3

Investigating Malicious Document File

Malicious Excel files have been a popular vector for delivering malware, phishing, and other types of cyberattacks. Excel files are commonly used for sharing data and macros, which makes them a popular target for cybercriminals. In this article, we will discuss how to investigate a malicious Excel file and identify…

Malware

5 min read

Investigating Malicious Document File
Investigating Malicious Document File
Malware

5 min read


Published in

MII Cyber Security Consulting Services

·Mar 21

Wolvctf2023: WannaFlag Series 1–3

This week I participated in the CTF event organized by WolvSec. In this event, I only focused on the forensic and OSINT challenges. In this article I will discuss the OSINT challenge. Challenge OSINT is a series tagged WannaFlag, with a starting question set of 3 and 2 more after completing…

Cybersecurity

8 min read

Wolvctf2023: WannaFlag Series 1–3
Wolvctf2023: WannaFlag Series 1–3
Cybersecurity

8 min read


Published in

MII Cyber Security Consulting Services

·Mar 6

Memory Forensic — Linux Kernel Confusion

Memory forensics is one of the sub-categories of digital forensics that I usually find in ctf competitions. Where it is necessary to analyze the results of a memory dump of an operating system such as windows or linux. I found this topic after joining the Cyberscape ctf yesterday, which was…

Memory Forensics

7 min read

Memory Forensic — Linux Kernel Confusion
Memory Forensic — Linux Kernel Confusion
Memory Forensics

7 min read


Published in

MII Cyber Security Consulting Services

·Mar 5

Network Forensic — SMUX Protocol

This topic come from one of the digital forensics category challenges held by Autobahn Security. This time I will discuss the category of network forensics. This challenge completed a few days after the competition is over :( The brief of this challenge is as follows. We captured a lot of suspicious HTTP requests last month on one of…

Ctf

4 min read

Network Forensic — SMUX Protocol
Network Forensic — SMUX Protocol
Ctf

4 min read


Jun 18, 2022

Follina: Incident Response

Follina or known and listed as CVE-2022–30190 is one of latest famous vulnerability that revealed on May 2022. This vulnerability affect microsoft office document that bring malicious html as external link and goes to execute powershell code to take over the system. More insight i got when try to solve…

Cybersecurity

4 min read

Follina: Incident Response
Follina: Incident Response
Cybersecurity

4 min read


Published in

System Weakness

·May 8, 2022

NahamCon CTF 2022: OSINT Challenge

NahamCon CTF 2022 is a gamified cyber security event and part of free virtual security conference Hosted by STOK, John Hammond and NahamSec. One of the challenge is OSINT(Open Source Intelligence), if you new about it I already write about OSINT in bahasa here. It’s a bundle challenge titled Keeber…

Osint

6 min read

NahamCon CTF 2022: OSINT Challenge
NahamCon CTF 2022: OSINT Challenge
Osint

6 min read


Mar 17, 2022

Simple Step Applying CIS Benchmark Hardening: Ubuntu Server

Hardening sering terdengar dalam dunia teknologi informasi yang bila dibahasakan memiliki makna pengerasan, ini sejalan dengan proses yang dilakukan yaitu meningkatkan keamanan pada sebuah perangkat sistem informasi dengan menerapkan baseline tertentu, sehingga dapat terkesan makin keras, semakin solid. Karena tidak mungkin bila menggunakan perangkat dengan konfigurasi default dari sumbernya. …

Cybersecurity

3 min read

Simple Step Applying CIS Benchmark Hardening: Ubuntu Server
Simple Step Applying CIS Benchmark Hardening: Ubuntu Server
Cybersecurity

3 min read


Feb 13, 2022

BTLO: SPECTRUM(Audio Steganography)

Steganography is the art of concealing a message, image, or file within another message, image, or file, so, audio steganography is a technique used in steganography, to hide data in audio media. One of this technique is utilize the audio spectrum to hide the data. Hiding secret messages in digital…

Forensics

3 min read

BTLO: SPECTRUM(Audio Steganography)
BTLO: SPECTRUM(Audio Steganography)
Forensics

3 min read


Nov 16, 2021

BTLO: D3FEND

Disclaimer: this post is for learning purposes. I hope you already done with all official sources of the platform and learn it. I will start this post by explaining a little about the D3FEND framework. If you already search this, you’ll be directed to https://d3fend.mitre.org/. d3fend is a new schema…

Cybersecurity

3 min read

BTLO: D3FEND
BTLO: D3FEND
Cybersecurity

3 min read

Faishol Hakim

Faishol Hakim

31 Followers

DFIR & OSINT Enthusiast

Following
  • M'hirsi Hamza

    M'hirsi Hamza

  • SOCFortress

    SOCFortress

  • Cyberknow

    Cyberknow

  • VEEXH

    VEEXH

  • Dancho Danchev

    Dancho Danchev

See all (46)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams