Marcelle LeeTryHackMe Walkthrough: Snapped Phish-ing LineThis is the second of my TryHackMe (THM) walkthroughs. THM is a fabulous platform for learning, with a wide variety of topics and skill…Sep 4, 2023Sep 4, 2023
Marcelle LeeTryHackMe Walkthrough: h4ckedThis is the first of my TryHackMe (THM) walkthroughs. THM is a fabulous platform for learning, with a wide variety of topics and skill…Aug 15, 2023Aug 15, 2023
Marcelle LeeCTF Challenge Walkthrough: Network Traffic Analysis, 12 Challenges in one PCAPIt has been a while since I have posted a walkthrough and I was just thinking about this network traffic analysis challenge since I was…Oct 25, 2020Oct 25, 2020
Marcelle LeeKickstarting Your Career in Cybersecurity — Cyber CompetitionsAuthor’s note: I originally published this article on LinkedIn. Since then, I have curated some competition-oriented resources on my…Jul 13, 2019Jul 13, 2019
Marcelle LeeRoam If You Want To…Travel Tips from 43K FeetTraveling can be an adventure. It can also be a nightmare. Learning how to best navigate (pun intended!) is an essential part of making…Jun 19, 2019Jun 19, 2019
Marcelle LeeCTF Challenge Walkthrough: Logical OperationsThe challenge in this walkthrough asked for the result in decimal of 4A & 2D. Competitors typically attempt a mathematical addition…May 19, 2019May 19, 2019
Marcelle LeeCTF Challenge Walkthrough: Network Traffic Analysis, Rogue UserIn this walkthrough, we will be analyzing a packet capture (PCAP) file, rogue_user.pcap. The challenge was to identify the rogue user that…Feb 27, 20191Feb 27, 20191
Marcelle LeeCTF Challenge Walkthrough: File MetadataThis is the second in my series of cyber competition challenge walkthroughs. As I’ve mentioned previously, Capture the Flag (CTF)…Dec 17, 2018Dec 17, 2018
Marcelle LeeCTF Challenge Walkthrough: Modified HeaderThis is the first of my promised Capture the Flag (CTF) cyber competition walkthroughs. I built the subject forensics-oriented modified…Nov 25, 20181Nov 25, 20181
Marcelle LeeThe Importance of Networking in CybersecurityThe cybersecurity community is relatively small and very connected, and it is essential to grow and nurture a network. Who you develop…Nov 23, 2018Nov 23, 2018