• Disk Forensics P4

    Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

  • Disk Forensics P3

    Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

  • Disk Forensics P2

    Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

  • Disk Forensics P1

    Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]

  • Analyzing Router Firmware P5

    You receive a Dlink_firmware. Somewhere inside this binary there are telnet credentials stored. Your task is to analyze the file and find the credentials… This […]

  • Analyzing Router Firmware P4

    Challenge 4 – Investigating Modifications Original and modified OpenWRT router firmware are provided to us (openwrt-ar750-sysupgrade.bin.orig and openwrt-ar750-sysupgrade.bin respectively). Analyze the firmware and answer the following questions: […]

  • Analyzing Router Firmware P3

    Challenge 3 – hidden backdoor A massive breach was detected at an insurance company. Their admin suspects that their Wi-Fi routers were compromised and have […]

  • Analyzing Router Firmware P2

    Challenge 2 – weak root password You’ve received an OpenWRT based firmware for analysis. The company assures you that the firmware is secure. You have […]

  • Analyzing Router Firmware P1

    Challenge 1 – find network backdoor You have received a firmware image for forensic analysis. The network administrator uncovered this backdoor while monitoring the network. […]