Day 8
Disk forensics Have a Holly, Jolly Byte! This room is an introduction to FTK Imager
What is the malware C2 server?
Check one of the deleted .txt files you can find the C2 server in it.


Last updated
Disk forensics Have a Holly, Jolly Byte! This room is an introduction to FTK Imager
What is the malware C2 server?
Check one of the deleted .txt files you can find the C2 server in it.


Last updated
What is the file inside the deleted zip archive?
Just like the previous question look into the deleted zip archive you will find the file in it.What flag is hidden in one of the deleted PNG files?
First we need to change to hex when and then look into the deleted PNG files to get the flagWhat is the SHA1 hash of the physical drive and forensic image?
To get the SHA1 hash right click on the physical drive and click Verify Drive/Image
This will give us the SHA1 Hash.