QnQSec 2025 — Masks
CTF WriteupTracing a phishing attack chain from initial email delivery in Outlook to scheduled task persistence using Volatility 3 and AmCache forensics.
Forensics, malware analysis, incident response, and more from competitions worldwide.
Tracing a phishing attack chain from initial email delivery in Outlook to scheduled task persistence using Volatility 3 and AmCache forensics.