{"id":751,"date":"2020-08-31T20:17:23","date_gmt":"2020-08-31T19:17:23","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=751"},"modified":"2020-09-07T21:25:02","modified_gmt":"2020-09-07T20:25:02","slug":"disk-forensics-p2","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=751","title":{"rendered":"Disk Forensics P2"},"content":{"rendered":"<blockquote>\n<p dir=\"ltr\" style=\"text-align: justify;\">Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">In this lab, a disk image file \u201cevidence.img\u201d is provided in the home directory of the root user (\/root\/). One of the JPEG files present on the disk contains the flag.<\/p>\n<\/blockquote>\n<p dir=\"ltr\" style=\"text-align: justify;\"><b>Objective:<\/b>\u00a0Extract files from the given image using\u00a0<b><a href=\"http:\/\/foremost.sourceforge.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Foremost<\/a><\/b>\u00a0tool and retrieve the flag!<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><b>Guidelines:<\/b><\/p>\n<ul>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/github.com\/atanunq\/viu\" target=\"_blank\" rel=\"noopener noreferrer\">viu tool<\/a>\u00a0can be used to view image files on command-line interface (CLI).<\/li>\n<\/ul>\n<p>First let&#8217;s check the command reference of the tool foremost that is linked above.<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-755\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost1.png\" alt=\"\" width=\"573\" height=\"280\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost1.png 573w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost1-300x147.png 300w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/a><\/p>\n<p><code>foremost -v -i evidence.img -o output<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-757\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost2.png\" alt=\"\" width=\"489\" height=\"386\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost2.png 489w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost2-300x237.png 300w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" \/><\/a><\/p>\n<p>As we can see, one jpg file got extracted. Let&#8217;s open that file with the viu tool.<\/p>\n<p><code>cd output\/jpg<\/code><\/p>\n<p><code>viu 00263184.jpg<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-758\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost3.png\" alt=\"\" width=\"374\" height=\"151\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost3.png 374w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/foremost3-300x121.png 300w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/a><\/p>\n<p>And the flag is:<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/viu1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-759\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/viu1.png\" alt=\"\" width=\"475\" height=\"118\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/viu1.png 475w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/08\/viu1-300x75.png 300w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Disk forensics techniques are used to acquire the disk image, process this image to find artifacts of interest including deleted ones. In this lab, a <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=751\" title=\"Disk Forensics P2\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":762,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,16],"tags":[],"class_list":["post-751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensic","category-linux"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=751"}],"version-history":[{"count":5,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions"}],"predecessor-version":[{"id":760,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions\/760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/762"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}