Advent of OSINT 2025: Day Two

Day two Time for day two!. Thankfully for my daily schedule, the daily challenge is released at pre-determined dates. Today it was 3:00 GMT+1, same for tomorrow. On the fourth it will be at 4:30 GMT+1, and skipping ahead a little… 12:30AM GMT+1 on the 12th?! Bit odd, but I’m not going to complain if I get a bit more time to write these posts out. Unlike yesterday I actually completed this task before attempting this write-up. The challenge was released while I was still on the clock, so I took my lunch-break to do a fun little OSINT challenge. Unlike yesterday, todays challenge only has one question. I did end up needing a bit of assistance to get the answer in time for my lunch-break to end, but we’ll touch more on that later. ...

December 2, 2025 · 6 min · 1188 words · Ligniform

Advent of OSINT 2025: Day One

Day one OSINT has always been an interesting topic to me. Before I even know that cybersecurity was a viable path for my career I was already pretty good at OSINT. Admittedly, back then it would be searching up the usernames of other players on CS:GO and trying to find any information to give my team the upper hand (Might not have been the best way to use the information, but I’ve moved on from that life now). ...

December 1, 2025 · 3 min · 569 words · Ligniform

CTF Writeup: Phishing Email

Your email address has been leaked and you receive an email from Paypal in German. Try to analyze the suspicious email. Another LetsDefend challenge, this time focusing on Phishing emails! I’ve looked at phishing emails a lot at work. I’ve heard and read about SOC Burnout and… I’ll be honest, I’ve never really felt it. Part of what excites me in a SOC role is piecing together the story of an attack. The investigation side of SOC work scratches an itch for me. Maybe it comes from all the mystery novels I read as a kid, but putting together all the pieces of an attack and defining a clear story makes me happy. ...

November 23, 2025 · 7 min · 1433 words · Ligniform

CTF Writeup: PowerShell Kelogger

You are a malware analyst investigating a suspected PowerShell malware sample. The malware is designed to establish a connection with a remote server, execute various commands, and potentially exfiltrate data. Your goal is to analyze the malware’s functionality and determine its capabilities.. I’ve not used letsdefend before. A few years ago I looked at the various infosec learning platforms and decided to settle on TryHackMe. In my recent posts I’ve branched out to CyberDefenders, and today I’ll be trying out the PowerShell Keylogger challenge. ...

November 20, 2025 · 15 min · 3153 words · Ligniform