Hack The Box

HTB
Sherlocks

Forensic investigation challenges that test your ability to analyze compromised systems, trace attacker footprints, and uncover hidden artifacts. From memory dumps to network captures — piece together the full intrusion timeline and identify every IOCs.

Sherlocks Forensics Threat Intel Memory Analysis
Quick Stats
2
Sherlocks
Forensics
Focus
Threat Intel
Category
Memory
Analysis
Sherlock Writeups
Sherlock Medium

APTNightmare2

Memory forensics investigation of an APT intrusion. Rootkit analysis, process reconstruction, and indicator extraction from a compromised Windows memory dump — tracing the full attack chain from initial access to persistence mechanisms.

Sherlock Medium

SalineBreeze-1

Network forensics challenge involving PCAP analysis of a phishing campaign. Trace the attacker's initial vector through email artifact extraction, credential harvesting infrastructure, and lateral movement indicators across the compromised network.