Disk Forensics P2
Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]
Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]
Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a […]
You receive a Dlink_firmware. Somewhere inside this binary there are telnet credentials stored. Your task is to analyze the file and find the credentials… This […]
Challenge 4 – Investigating Modifications Original and modified OpenWRT router firmware are provided to us (openwrt-ar750-sysupgrade.bin.orig and openwrt-ar750-sysupgrade.bin respectively). Analyze the firmware and answer the following questions: […]
Challenge 3 – hidden backdoor A massive breach was detected at an insurance company. Their admin suspects that their Wi-Fi routers were compromised and have […]
Challenge 2 – weak root password You’ve received an OpenWRT based firmware for analysis. The company assures you that the firmware is secure. You have […]
Challenge 1 – find network backdoor You have received a firmware image for forensic analysis. The network administrator uncovered this backdoor while monitoring the network. […]
Copyright © 2025 | WordPress Theme von MH Themes