Skip to main content

51 docs tagged with "Forensics"

Includes write-ups on the topic of Forensics

View all tags

085

- DescriptionHMV{}

086

- Description HMV

advanced-potion-making

- Description: Ron just found his own copy of advanced potion making, but its been corrupted by some kind of spell.

Bitlocker-1

- Description: Jacky is not very knowledgable about the best security passwords and used a simple password to encrypt their BitLocker drive. See if you can break through the encryption!

Bitlocker-2

- Description: Jacky has learnt about the importance of strong passwords and made sure to encrypt the BitLocker drive with a very long and complex password. We managed to capture the RAM while this drive was opened however.

Blame Game

- Description: Someone's commits seems to be preventing the program from working. Who is it?

CanYouSee

- Description: How about some hide and seek?

Capture this

- Description: An employee has lost his Keepass password.

Collaborative Development

- Description: My team has been working very hard on new features for our flag printing program! I wonder how they'll work together?

Command & Control - level 4

- Description: Berthier, thanks to this new information about the processes running on the workstation, it's clear that this malware is used to exfiltrate data.

Command & Control - level 6

- Description: Berthier, before blocking any of the malware's traffic on our firewalls, we need to make sure we found all its C&C.

Commitment Issues

- Description: I accidentally wrote the flag down. Good thing I deleted it!

Corrupted file

- Description: This file seems broken... or is it? Maybe a couple of bytes could make all the difference. Can you figure out how to bring it back to life?

Deleted file

- Description: Your cousin found a USB drive in the library this morning.

Disk, disk, sleuth!

- Description: Use srch_strings from the sleuthkit and some terminal-fu to find a flag in this disk image

DISKO 1

- Description: Can you find the flag in this disk image?

DISKO 2

- Description: Can you find the flag in this disk image? The right one is Linux! One wrong step and its all gone!

DISKO 3

- Description: Can you find the flag in this disk image? This time, its not as plain as you think it is!

Eavesdrop

- Description: Download this packet capture and find the flag.

Enhance!

- Description: Download this image file and find the flag.

ETHERNET - frame

- Description: Find the (supposed to be) confidential data in this ethernet frame.

Event-Viewing

- Description: One of the employees at your company has their computer infected by malware!

extensions

- Description: This is a really weird text file TXT? Can you find the flag?

File types

- Description: This file was found among some files marked confidential but my pdf reader cannot read it, maybe yours can.

FindAndOpen

- Description: Someone might have hidden the password in the trace file.

Flag in Flame

- Description: The SOC team discovered a suspiciously large log file after a recent breach.

Hidden in plainsight

- Description: You're given a seemingly ordinary JPG image. Something is tucked away out of sight inside the file. Your task is to discover the hidden payload and extract the flag.

hideme

- Description: Every file gets a flag.

information

- Description: Files can always be changed in a secret way. Can you find the flag?

Investigative Reversing 0

- Description: We have recovered a binary and an image. See what you can make of it. There should be a flag somewhere.

Lespion

- Description: Investigate an insider threat by analyzing GitHub repositories for exposed credentials, using OSINT tools to correlate online accounts, and performing image analysis to identify locations.

like1000

- Description: This .tar file got tarred a lot.

RED

- Description: RED, RED, RED, RED

Riddle Registry

- Description: Hi, intrepid investigator! 📄🔍 You've stumbled upon a peculiar PDF filled with what seems like nothing more than garbled nonsense. But beware! Not everything is as it appears. Amidst the chaos lies a hidden treasure-an elusive flag waiting to be uncovered.

Secret of the Polyglot

- Description: The Network Operations Center (NOC) of your local institution picked up a suspicious file, they're getting conflicting information on what type of file it is. They've brought you in as an external expert to examine the file. Can you extract all the information from this strange file?

Sleuthkit Intro

- Description: Download the disk image and use mmls on it to find the size of the Linux partition.

So Meta

- Description: Find the flag in this picture.

St3g0

- Description: Download this image and find the flag.

Time Machine

- Description: What was I last working on? I remember writing a note to help me remember...

Twitter authentication

- Description: A twitter authentication session has been captured, you have to retrieve the password.

WebStrike

- Description: Analyze network traffic using Wireshark to investigate a web server compromise, identify web shell deployment, reverse shell communication, and data exfiltration.