Logo
Capture The Flag
Overview
Capture The Flag

Capture The Flag

February 23, 2025
1 min read (14 min read total)
1 subpost
Available in:

This section contains writeups from Capture The Flag competitions and detailed solutions to cybersecurity challenges demonstrating practical attack techniques and problem-solving methodologies.

GCTF 2025 - Case Challenge Writeup

Detailed writeup of a realistic phishing investigation challenge created for the 2025 Guardia CTF competition co-organized at Guardia Cybersecurity School. The challenge simulates a real-world incident response scenario where participants act as elite cybersecurity analysts investigating a suspicious URL disseminated within GuardiaCorp’s internal networks. Based on an actual phishing campaign encountered during security operations, the challenge requires creating a comprehensive forensic report describing the attacker’s methodology and techniques. The 5-hour CTF challenge involves analyzing the phishing infrastructure starting from the entry point URL (https://case.gctf.tech#jhubert@gmail.com), tracing the attack chain, identifying social engineering tactics, examining malicious payloads, and documenting findings in a professional incident response report format. The writeup demonstrates practical phishing analysis techniques including URL inspection, infrastructure reconnaissance, and threat actor methodology identification essential for SOC analysts and incident responders.