7th Place in UW-Stout's Cyber CTF 2025
Breakdown of UW-Stout's CTF challenges and key takeaways that came from such challenges (WILL BE ADDED SOON)
Breakdown of UW-Stout's CTF challenges and key takeaways that came from such challenges (WILL BE ADDED SOON)
Analyzed an MD5 hash of a malicious file using sandbox reports. Extracted vital information and mapped identified behaviors to MITRE ATT&CK techniques.

Easy rated Linux box showcasing basic enumeration tactics, web application exploitation, and identifying file misconfigurations to escalate user privileges
