• Worked on Digital Forensics investigations including evidence acquisition and analysis.
• Learned forensic tools for imaging, preservation, and reporting.
• Gained practical experience in forensic methodology.
• Learned fundamentals of Cyber Forensics.
• Hands-on with Autopsy, Volatility, and other free tools.
• Built foundations in forensic analysis & incident response.
• Solved Crypto challenges: strengthened understanding of cryptographic algorithms, encoding/decoding techniques, and applied brute-force approaches.
• Worked on OSINT challenges: performed online investigations, leveraged open-source intelligence tools, and improved structured intelligence-gathering workflow.
• Learned to apply time management and problem-solving strategies under competition settings.
• Focused on Disk Forensics challenges: analyzed disk images, uncovered hidden artifacts, and extracted meaningful evidence.
• Worked on Crypto challenges: practiced decryption methods, substitution ciphers, and key recovery techniques.
• Participated in OSINT investigations: correlated data across platforms to identify hidden clues.
• Enhanced ability to approach forensics systematically while cross-verifying results with tools.
• Completed Pwn challenges: performed port scanning, enumerated open services, and executed exploits to gain access.
• Practiced network exploitation techniques to identify and leverage vulnerabilities.
• Solved Crypto & OSINT challenges, strengthening multi-domain problem solving.
• Learned to simulate penetration testing in industrial-style environments, gaining real-world offensive security exposure.