Skip to content

Latest commit

 

History

History
79 lines (44 loc) · 1.9 KB

Task 14 [Day 8] Disk forensics Have a Holly, Jolly Byte!.md

File metadata and controls

79 lines (44 loc) · 1.9 KB

Task 14 [Day 8] Disk forensics Have a Holly, Jolly Byte!


Task Objectives

Use FTK Imager to track down and piece together McGreedy's deleted digital breadcrumbs, exposing his evil scheme. Learn how to perform the following with FTK Imager:

  • Analyse digital artefacts and evidence.
  • Recover deleted digital artefacts and evidence.
  • Verify the integrity of a drive/image used as evidence.

After the Machine is up go ahead and open ftk imager.

Screenshot 2023-12-28 at 3 09 51 PM

open physical drive 2 by adding evidence inside ftk imager.

Screenshot 2023-12-28 at 3 12 04 PM

Questions:


What is the malware C2 server?

Screenshot 2023-12-28 at 3 16 51 PM

Answer

mcgreedysecretc2.thm

What is the file inside the deleted zip archive?

Screenshot 2023-12-28 at 3 19 12 PM

Answer

JuicyTomaTOY.exe

What flag is hidden in one of the deleted PNG files?

Screenshot 2023-12-28 at 3 22 26 PM

Answer

THM{byt3-L3vel_@n4Lys15}

What is the SHA1 hash of the physical drive and forensic image?

Screenshot 2023-12-28 at 3 26 01 PM

Answer

39f2dea6ffb43bf80d80f19d122076b3682773c2