Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

120 total results found

Nexora Dynamics Investigation – Final Report

Nexora Dynamics

Case Details Case Number: ND-2025-02-03-001   Investigator Name: David Rizzo   Date: March 2, 2025   1. Executive Summary Nexora Dynamics, a medium-sized engineering services firm, experienced a significant security breach. The attack began with a successful s...

CIO Company Address

Nexora Dynamics Notes

CIO Update Network Issues - Slowdowns - Webpages taking forever to load - Difficulty accessing services or complete downtime - servers randomly crashing & rebooting without any clear Explanation - Spike in network traffic & bandwitdth - Infastructure strain - ...

Introduction to Advanced Persistent Threats

Nexora Dynamics Notes

Email from John Carter to Fellow IT Team Potential Cyber Threat Actors responsible for the attack impacting Nexora Dynamics APT - Sophisticated Cyebr Attackers that operate golablly each with their own targets tools and motivations Four Groups: APT 33 - Elfin ...

Equipment

Nexora Dynamics Notes

Key Infastructure Imacated, Integral to both inertnal operationbs and external system delivery Web Server puiblic facing application Substancial delays in response times and service availablitlity to to abnormla traffic volumes Increase page load times and int...

Interviews

Nexora Dynamics Notes

Sarah About - Employee - Describes challanges she has recently faces with Nexora network and web server. Notes - Network Slow - Affects productivity - Tasks such as sending and email or accessing files take longer than they should - Webserver was working one ...

Threat Actor Email

Nexora Dynamics Docs

From: John Carter (IT Supervisor) To: Sarah Barnes (System Administrator), Lisa Reynolds (Network Administrator) CC: IT Security Team Hi Sarah, Lisa, Thank you both for all the hard work in getting to the bottom of this incident. Given the indicators we’ve fou...

Equipment Email

Nexora Dynamics Docs

All, Just wanted to report on the list of IT equipment impacted by the recent network issues, including make, model, and serial numbers for each. Please review the details below and let me know if any additional information is required for troubleshooting. We...

Attack Symptoms

Nexora Dynamics Docs

Email 1: From Lisa Reynolds (Network Administrator) to John Carter Subject: Urgent: Network Slowdown and Unusual Traffic Hi John, We’re seeing major slowdowns across multiple systems. I’ve received reports from both users and monitoring tools. It looks like th...

Company Info

Nexora Dynamics Docs

Company Name: Nexora Dynamics Industry: Engineering Services Company Size: Medium-sized enterprise (250-500 employees) Headquarters: Baltimore, MD Established: 2008 Company Overview: Nexora Dynamics is a leading provider of cutting-edge engineering services, s...

Cryptography

National Cyber League

Tools Used RapidTables https://www.rapidtables.com/web/tools/index.html Base64 Binary Hex String Cryptii https://cryptii.com/ Decode Decode https://www.dcode.fr/ RSA Cipher Kali Linux Strings Challange 1 Using rapidtables I was able to decode ...

Individual Game Technical Writeup

National Cyber League

Table of Contents Introduction Open Source Intelligence (OSINT) Cryptography Password Cracking Log Analysis Network Traffic Analysis Forensics Scanning & Reconnaissance HMAC Integrity Verification Conclusion Introduction This document provides a technical an...

Binary Parser

National Cyber League Scripts

import struct import socket import datetime from collections import defaultdict, Counter def parse_binary_logs(file_path): """Parse binary log file according to the specified format.""" login_attempts = [] with open(file_path, 'rb') as f: ...

Compromised User Detector

National Cyber League Scripts

import struct import socket import datetime from collections import defaultdict, Counter def parse_binary_logs(file_path): """Parse binary log file according to the specified format.""" login_attempts = [] with open(file_path, 'rb') as f: ...

GPG Verify

National Cyber League Scripts

#!/bin/bash echo "Verifying signature files in the current directory..." for sig_file in *.sig; do if [[ -f "$sig_file" ]]; then original_file="${sig_file%.sig}" echo "" echo "Verifying signature for \"$original_file\" using \"$sig_file\"..." ...

Hash Identifier

National Cyber League Scripts

#!/usr/bin/env python3 import re import sys import hashlib from collections import defaultdict def identify_hash(hash_string): """Identify the type of hash based on pattern, length, and character set.""" # Clean the hash string hash_string =...

HMAC

National Cyber League Scripts

#!/usr/bin/env python3 """ Simple HMAC Verification Script This script verifies HMAC signatures for message files by: 1. Finding all message_#.txt and message_#.hmac file pairs 2. Checking each line to verify the HMAC integrity 3. Reporting only basic verific...

HMAC Integrity Checker

National Cyber League Scripts

#!/usr/bin/env python3 """ DNS Subdomain Batch Integrity Checker This script processes multiple message/HMAC file pairs in a directory, following the pattern: message_#.txt and message_#.hmac It automatically detects and verifies all matching pairs in the sp...

Liber8tion Cracker

National Cyber League Scripts

#!/usr/bin/env python3 import os import argparse import subprocess import sys import tempfile import shutil def run_hashcat(cmd, description): """Run a hashcat command with proper logging""" print(f"[+] {description}") print(f"[+] Command: {' '.j...