forensicsmedium

:( (sad_face)

scarlet

Task: Forensics challenge with a Windows Event Log (.evtx) file containing hidden flag data related to BSOD/EternalBlue events. Solution: Parsed the EVTX file, extracted Binary fields from BugCheck events (EventID 1001/41), and applied double Base64 decoding to reconstruct the three flag parts.

$ ls tags/ techniques/
evtx_parsingbase64_double_decodeevent_log_analysisbinary_data_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]