Encient
Index
Initializing search
    • Cybersecurity Cheatsheets
    • CTF Writeups
    • HTB Sherlocks (In Progress)
    • Blog
          • Detecting Common User/Domain Recon
          • Detecting Password Spraying
          • Detecting Responder-like Attacks
          • Detecting Kerberoasting/AS-REProasting
          • Detecting Pass-the-Hash
          • Detecting Pass-the-Ticket
          • Detecting Overpass-the-Hash/Pass-the-Key
          • Detecting Golden Tickets and Silver Tickets
          • Detecting Unconstrained Delegation and Constrained Delegation Attacks
          • Detecting DCSync and DCShadow Attacks
        • 🔍 Volatility 2 & 3 Cheatsheet
          • [ About ]
          • Fur Elise
          • SCP 2.0
          • [ About ]
          • Clone
          • The Realm of Eerie-Area
          • [ About ]
          • RSA
          • Broken
          • Wireshark 1
          • Wireshark 2
          • History
          • KB
          • Frequency
          • Office
          • Master Hidden Within the Slides
          • PNG
            • Enumeration and Escalation
            • [ About ]
            • Cash Me Ousside
            • Almanac
            • Number Cruncher
          • [ About ]
          • Covert
          • Memory
          • Mystery File
          • [ About ]
            • Allowance
            • Warmup Salsa Sauce
            • Warmup Cipher
            • Overflow Resources
            • QNA
            • Fox Secrets
            • Olivia's Boxter
            • Stop Slacking Off
            • MFTBasics
            • I Forgot
            • Find Me 1
            • Find Me 2
            • DevOps 101
            • Dev(Sec?)Ops
            • Phone Siapa Ni?
            • Gopher-chan
            • Rainbow I
            • Rainbow II
            • Ret2Win I
        • Easy1
        • Medium1
        • Hard1
    • Blog
        • 2025
        • 2024
        • 2023
        • Cloud
        • DFIR
        • Event
        • Honeypot
        • RE
        • Technical
        • Volatility
    • Feb 2, 2025
    • in Technical, Honeypot, Cloud
    • 6 min read

    Deploy T-Pot in Azure Cloud for Free

    Step-by-step guide on deploying an open-source honeypot named T-Pot in Azure Cloud using free student credit.

    Continue reading
    • Dec 2, 2024
    • in Technical, DFIR, RE
    • 6 min read

    Reversing a Phishing Webpage

    This blog shows the steps of analyzing and reverse engineering a Microsoft Outlook login page that is sent through phishing email.

    Continue reading
    • Mar 1, 2024
    • in Event
    • 3 min read

    GCC 2024: Participant's Experience

    Sharing my experience as the only female participant from Malaysia in Glocal Cybersecurity Camp (GCC) 2024.

    Continue reading
    • Dec 30, 2023
    • in Technical, DFIR, Volatility
    • 7 min read

    Build a Linux Profile for Volatility 2

    Step-by-step guide on building an Ubuntu profile for Volatility 2 and fixing the errors.

    Continue reading
    • Jun 23, 2023
    • in Event
    • 4 min read

    MCC 2022: Participant's Experience

    Sharing my experience as a participant in Malaysian Cybersecurity Camp (MCC) 2022.

    Continue reading
    Previous
    Hard1
    Next
    Cloud