This CTF challenge is about retrieving data from a memory dump, and analyzing the processes and connections and dealing with registries! # Challenge Information Description A memory image was taken from a seized Windows machine. Analyze the image and answer the provided questions. Challenge Link...

# An introduction to Kubernetes Secrets and ConfigMaps Kubernetes has two types of objects that can inject configuration data into a container when it starts up: Secrets and ConfigMaps. Secrets and ConfigMaps behave similarly in Kubernetes, both in how they are created and because they can be...

This CTF challenge is about retrieving data from a disk image, and analyzing a maldoc using oledump. The maldoc download a malware in our victim personal computer! Let’s figure out what is going on! # Challenge Information Description A company’s employee joined a fake iPhone giveaway. Our team took...

Kubeadm is a tool used to build Kubernetes (K8s) clusters. Kubeadm performs the actions necessary to get a minimum viable cluster up and running quickly. By design, it cares only about bootstrapping, not about provisioning machines (underlying worker and master nodes). Knowing how to use kubeadm is...