Skip to content

Commit f9d23e6

Browse files
committed
Forensics Challenge Message and Hints
1 parent e23b8e9 commit f9d23e6

File tree

11 files changed

+105
-2
lines changed

11 files changed

+105
-2
lines changed

forensics/HASH-browns/README.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,13 @@
44
## Solution
55
```bash
66
openssl md5 file* | awk '{print $2}' | python3 -c 'import sys;data = sys.stdin.read(); print(sum([int(f"{line[-4:]}", 16) for line in data.split("\n") if line != ""]))'
7-
```
7+
```
8+
9+
10+
---
11+
12+
## Challenge Message
13+
Before you can start your day, you must eat breakfast. Not just any ordinary breakfast though — hash browns fit for a hero! While eating your hashbrowns, you must get the decimal sum of the last 4 digits of all each file from your virtual breakfast in order to properly digest your breakfast and awaken your superpowers. This breakfast is md(mmmmm) good
14+
15+
## Challenge Hints
16+
* Did you convert it from hex to decimal? And did you make sure to get only the last 4 digits? Also make sure it is between the jctf{} flag formatter.

forensics/alternate-reality/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,3 +17,10 @@ cat flag.txt:hidden
1717
```
1818

1919
Flag: jctf{FL492 1N 73h S7r34M}
20+
21+
---
22+
23+
## Challenge Message
24+
# Challenged by **SpecterOps**
25+
26+
It turns out that there are not one, but two disks in the PC. Finding the flag in the previous disk left you confused. Seems like you will have to find the flag in this forensic disk image too!

forensics/closed-creds/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,3 +14,13 @@ john --format=NT --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
1414

1515

1616
Flag: jctf{Password1}
17+
18+
---
19+
20+
## Challenge Message
21+
The clues from the camera led you to a mysterious building. Surprisingly, the front door was left unlocked. Unsurprisingly, the computer in the headquarters was not left unlocked. Using the registry files provided, will you be able to crack the password of the Administrator user?
22+
23+
24+
## Challenge Hints
25+
* Research dumping hashes from SAM.
26+
* Submit the flag in the following format: **jctf{flag}**.

forensics/data-about-data/README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,3 +9,11 @@ exiftool photo.jpg
99
```
1010

1111
Flag: jctf{4lW4Ys_cH3ck_TH3_M3T4D4t4}
12+
13+
---
14+
15+
## Challenge Message
16+
It seems the robber was captured on the bank’s CCTV. For some reason, the camera data seems to be zipped. Search through the zip archive to find anything out of the ordinary, in the form of a flag!
17+
18+
## Challenge Hints
19+
Cameras produce a lot of metadata.

forensics/file-desc/README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1 +1,13 @@
11
# file-desc
2+
3+
4+
5+
---
6+
7+
## Challenge Message
8+
# Challenged by **NJCCIC**
9+
10+
Congratulations, you’re a cybersecurity superhero now! You’ve received a letter explaining your newfound skills, but are having trouble with opening the letter. It would be so much easier to read if only you knew what file type was...
11+
12+
## Challenge Hints
13+
* Did you add the output to jctf{INSERT_FILE_TYPE_HERE}?

forensics/investigating-windows/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,13 @@ perl /usr/share/windows-resources/regripper/rip.pl -r ./software -p profilelist
1212
Flag: jctf{S-1-5-21-1410353290-3892556988-1991803543-1001}
1313

1414

15+
---
16+
17+
## Challenge Message
18+
A robber has broken through the Windows into the municipal bank! The civilians of the city have called upon you to identify and capture the villain.
19+
20+
Use your heroic forensics superpowers to find the SID of the user robbr using the Windows registry files provided!
21+
22+
## Challenge Hints
23+
* Try reg ripper?
24+
* Submit the flag in the following format: **jctf{flag}**.

forensics/pw-backup/README.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,10 @@ contains a USB pcap file that has a packet of data containing a png image with t
1010
there are decoy files in the pcap, and it isn't explicitly shown to be a pcap.
1111
1212
flag: jctf{CorrectUSB14}
13-
```
13+
```
14+
15+
---
16+
17+
## Challenge Message
18+
It seems that there is a USB attached to the PC. But what does this all mean — what is the big picture? Search through the files in the USB to find out!
19+

forensics/traffic-analysis/README.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,3 +8,9 @@ The flag can before found in the TCP stream of the traffic on port 4444.
88

99

1010
Flag: jctf{8R0_D0_y0u_3v3N_Pc4P}
11+
12+
---
13+
14+
## Challenge Message
15+
Crypto Woman wants to join you to find any flags in a packet capture and put them to justice. When you said you were a better superhero than her, she responded: "That is pCAP!"
16+

forensics/volatile-memory-1/README.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,14 @@ volatility -f memdump.mem imageinfo
2121

2222

2323
Flag: jctf{1808}
24+
25+
---
26+
27+
## Challenge Message
28+
Oh no, we need to find out the PID (process ID) of notepad.exe in order to save the city for some unknown reason! No questions asked, just do it!
29+
30+
Use the RAM image found at:
31+
https://drive.google.com/drive/folders/1a7NZ5g3TR1Pn6hxsf68AsSwP-ItqaHl_?usp=sharing
32+
33+
## Challenge Hints
34+
* Submit the flag in the following format: **jctf{flag}**.

forensics/volatile-memory-2/README.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,3 +16,18 @@ Volatility 2
1616
volatility -f memdump.mem imageinfo
1717
/opt/volatility/vol.py --profile=Win2012R2x64_18340 netscan -f memdump.mem
1818
```
19+
20+
21+
---
22+
23+
## Challenge Message
24+
*Destination Port 4444* is the only open entrance for the remote superhero island of WeCantWaitUntilCOVIDIsOver.
25+
26+
In order for the *executable* boats filled with superheros to gain access to the island, the ship *name* must be identified.
27+
28+
Use the RAM image found at:
29+
https://drive.google.com/drive/folders/1a7NZ5g3TR1Pn6hxsf68AsSwP-ItqaHl_?usp=sharing
30+
31+
## Challenge Hints
32+
* Submit the flag in the following format: **jctf{flag}**.
33+
* What is the name of the executable using destination port 4444?

0 commit comments

Comments
 (0)