<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>abu-sayed.me</title><description>Computer Science Student | Cybersecurity and Cloud Enthusiast</description><link>https://sayed-47.github.io/</link><language>en</language><item><title>Knight CTF 2026 - Forensics Writeups</title><link>https://sayed-47.github.io/posts/knight-ctf-2026-forensics-writeups/</link><guid isPermaLink="true">https://sayed-47.github.io/posts/knight-ctf-2026-forensics-writeups/</guid><description>A polished walkthrough of all 7 chained Knight CTF 2026 forensics challenges, with artifacts, evidence paths, and final flags.</description><pubDate>Fri, 23 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;All seven forensics tasks in Knight CTF 2026 were chained, so each solution unlocked the next one. This writeup keeps the full investigation flow while presenting the steps in a cleaner format.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/cover.png&quot; alt=&quot;Knight CTF 2026 Forensics Challenges&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 1 - Void Echo&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch1-void-echo.png&quot; alt=&quot;Void Echo&quot; /&gt;&lt;/p&gt;
&lt;p&gt;This first challenge mainly tested attention to the long scenario text. The provided list of user passwords contained the direct answer.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Required clue: User3 password from the prompt&lt;/li&gt;
&lt;li&gt;Extracted value: &lt;code&gt;ksacademy3321&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;ksacademy3321&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 2 - Event Horizon&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch2-event-horizon.png&quot; alt=&quot;Event Horizon&quot; /&gt;&lt;/p&gt;
&lt;p&gt;I merged the split image parts, extracted the Windows VM disk, then opened the data in Autopsy.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch2-vm-workflow.png&quot; alt=&quot;Recovered VM workflow&quot; /&gt;&lt;/p&gt;
&lt;p&gt;During triage, I found a Telegram bot reference and used the narrative hints to identify the attacker username.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch2-telegram-bot.png&quot; alt=&quot;Telegram bot lead&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Then I parsed the &lt;code&gt;SOFTWARE&lt;/code&gt; hive from:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;/Windows/System32/config/SOFTWARE&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;and recovered the support token.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Username: &lt;code&gt;Robert&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Token: &lt;code&gt;_Establishes_Persistence&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;KCTF{Robert_Establishes_Persistence}&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 3 - Echoes of 127&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch3-echoes-127.png&quot; alt=&quot;Echoes of 127&quot; /&gt;&lt;/p&gt;
&lt;p&gt;This challenge required combining host mapping evidence with a hidden Wi-Fi credential.&lt;/p&gt;
&lt;p&gt;From local DNS mapping:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;C:\Windows\System32\drivers\etc\hosts&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;I extracted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Host mapping key: &lt;code&gt;54ck3r-r0b3rt.local&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch3-hosts.png&quot; alt=&quot;Hosts file evidence&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Then I followed a clue file chain (&lt;code&gt;ReadMe.txt&lt;/code&gt; -&amp;gt; alternate stream note) and recovered:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Wi-Fi password: &lt;code&gt;Il0vesomeone1337&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch3-wifi-password.png&quot; alt=&quot;Wi-Fi password evidence&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;KCTF{54ck3r-r0b3rt.local_Il0vesomeone1337}&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 4 - Phone Location&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch4-phone-location.png&quot; alt=&quot;Phone Location&quot; /&gt;&lt;/p&gt;
&lt;p&gt;From the Telegram bot path, I reached the attacker&apos;s home-lab panel and recovered the phone number.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch4-home-lab.png&quot; alt=&quot;Home lab access&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The IP was not obvious in the visible UI. Inspecting source comments revealed an API route for login history.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch4-api-hint.png&quot; alt=&quot;Source comment with API hint&quot; /&gt;&lt;/p&gt;
&lt;p&gt;From that endpoint, I got last used macOS IP.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Phone: &lt;code&gt;+88013374041337&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Last macOS IP: &lt;code&gt;172.16.0.1&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;KCTF{+88013374041337_172.16.0.1}&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 5 - Discarded Directory&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch5-discarded-directory.png&quot; alt=&quot;Discarded Directory&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The wording hinted at deleted artifacts, so I started with recycle-bin style remnants.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch5-deleted-artifact.png&quot; alt=&quot;Deleted file artifact&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Hex from the recovered file decoded to partial flag text:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;4B4354467B726563307633725F55733372345F&lt;/code&gt; -&amp;gt; &lt;code&gt;KCTF{rec0v3r_Us3r4_&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch5-hint-doc.png&quot; alt=&quot;Hint in document&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The second half came from &lt;code&gt;Users/User4/Contacts&lt;/code&gt; (contact notes field).&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch5-contact-notes.png&quot; alt=&quot;Contact notes evidence&quot; /&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;lt;c:Notes&amp;gt;h1dden_c0ntr4ct5&amp;lt;/c:Notes&amp;gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;KCTF{rec0v3r_Us3r4_h1dden_c0ntr4ct5}&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 6 - Instructor Account Compromised&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch6-instructor-compromised.png&quot; alt=&quot;Instructor Account Compromised&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The prompt linked &lt;code&gt;admin2&lt;/code&gt; to &lt;code&gt;user5&lt;/code&gt; and web development traces. I focused on browser local data under User5.&lt;/p&gt;
&lt;p&gt;Path investigated:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;C:\Users\User5\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch6-leveldb.png&quot; alt=&quot;LevelDB artifact&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Using &lt;code&gt;strings&lt;/code&gt; plus filtering around &lt;code&gt;instructor&lt;/code&gt;, I recovered session-linked credential text.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SessionToken
T4r3Qhas5gf
UserRole
instructor
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;KCTF{T4r3Qhas5gf}&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Challenge 7 - Illegal Access to Admin3&lt;/h2&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch7-illegal-access.png&quot; alt=&quot;Illegal Access to Admin3&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Repeated &lt;code&gt;BGInfo&lt;/code&gt; artifacts stood out during timeline and keyword review. I searched for &lt;code&gt;bginfo&lt;/code&gt; globally in Autopsy and found a suspicious bitmap.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch7-bginfo-bmp.png&quot; alt=&quot;bginfo.bmp evidence&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Zooming into the embedded white text revealed the final value.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/images/knight-ctf-2026/ch7-final-text.png&quot; alt=&quot;Final hidden text extraction&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Flag:&lt;/strong&gt; &lt;code&gt;KCTF{ult1m4t3_f1nal_ch4ll}&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;Closing Notes&lt;/h2&gt;
&lt;p&gt;This challenge set was a good mix of memory, filesystem, browser, and OS artifact analysis. The biggest lesson was to keep chaining clues from narrative context to technical evidence instead of treating each file in isolation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Original publication: &lt;a href=&quot;https://medium.com/p/89c723ca1845&quot;&gt;Medium post&lt;/a&gt;&lt;/p&gt;
</content:encoded></item><item><title>Welcome to My Website</title><link>https://sayed-47.github.io/posts/welcome/</link><guid isPermaLink="true">https://sayed-47.github.io/posts/welcome/</guid><description>An introduction to who I am and what I share on this site.</description><pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate><content:encoded>&lt;h1&gt;Hi, I am Abu Sayed&lt;/h1&gt;
&lt;p&gt;Welcome to my personal website. I am a Computer Science and Engineering student at Bangladesh University of Professionals, and this space is where I share what I am learning and building.&lt;/p&gt;
&lt;h2&gt;What You&apos;ll Find Here&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Project notes&lt;/strong&gt; from my software and cloud experiments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security learning logs&lt;/strong&gt; focused on practical concepts and tools&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Technical writeups&lt;/strong&gt; on engineering topics I explore&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Personal updates&lt;/strong&gt; from my journey as a student and builder&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;About Me&lt;/h2&gt;
&lt;p&gt;I work across software development, cybersecurity, and cloud technologies. I also enjoy design work and continuous learning in AI/ML and quantum computing.&lt;/p&gt;
&lt;p&gt;You can connect with me on &lt;a href=&quot;https://linkedin.com/in/sayed47&quot;&gt;LinkedIn&lt;/a&gt; or explore my work on &lt;a href=&quot;https://github.com/Sayed-47&quot;&gt;GitHub&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Let&apos;s Connect&lt;/h2&gt;
&lt;p&gt;I value collaboration and knowledge sharing. Feel free to reach out if you want to discuss ideas, projects, or learning resources.&lt;/p&gt;
&lt;p&gt;Thanks for visiting.&lt;/p&gt;
</content:encoded></item></channel></rss>