Insomni’Hack 2026 – Golden Payout writeup

The challenge

A massive data breach has just hit our corporate network. Highly sensitive documents have been spotted on a prominent Darknet leaking platform. Preliminary network telemetry has flagged suspicious outbound traffic originating from a specific workstation belonging to one of our DBAs. As part of the Rapid Response Investigation Team, you have been assigned to perform a deep-dive forensic analysis of the suspect’s workstation.

Continue reading Insomni’Hack 2026 – Golden Payout writeup

Insomni’hack 2025 – GuLosity writeup

The challenge

A malware was provided from a real DFIR case that occurred in January 2024. The final payloads were disarmed here, to allow the analysts to dissect the binary safely until they fully understand the execution chain of a reflective shellcode loader named GuLoader [which initially led to the delivery of Remcos RAT with an additional keylogger, but the original nasty shellcodes were replaced by benign ones to provide the most realistic challenge].

Continue reading Insomni’hack 2025 – GuLosity writeup

Les oubliés des forensics: les Local Shared Objects

Dans le cas d’une analyse forensics, lors de la reconstruction des actions d’un utilisateur les cookies du navigateur sont l’un des premiers points à être analysé. Néanmoins, dans un navigateur ce dernier n’est pas le seul à laisser des traces: le lecteur Flash dispose également d’un système de cookies.

Continue reading Les oubliés des forensics: les Local Shared Objects