🔍

Forensics

Forensics challenges involve recovering evidence from disk images, memory dumps, packet captures, and log files. Skills include file carving, steganography, timeline analysis, and artifact interpretation.

What is it?

Digital forensics is the process of acquiring, preserving, and analysing digital evidence. Investigators examine hard drives, memory snapshots, network captures, and logs to reconstruct what happened, when, and by whom.

It is crucial for incident response, legal proceedings, and malware analysis. The discipline blends operating-system internals knowledge with investigative methodology and a strict chain-of-custody mindset.

How it works in a CTF

In a CTF, you receive a file (PCAP, disk image, memory dump, photograph, archive) and must uncover a hidden flag or answer questions about an attack. The flag may be deleted, buried in metadata, encoded in an image, or hidden inside encrypted network traffic.

Common workflow: identify the artefact type → use the appropriate tool (Wireshark, Volatility, Autopsy, ExifTool) → search for patterns or anomalies → extract and decode the flag.

Example challenge types
Recover deleted file from disk imageExtract flag from PCAP (follow TCP stream)Steganography (LSB in PNG)Memory dump — find running process secretsMetadata extraction (GPS in photo)NTFS alternate data streamsBrowser history / SQLite artefactsFile carving (no filesystem)Log analysis (find attacker IP)Email header analysisEncoded payload in DNS queriesCorrupted ZIP / PNG header repair

Sample Challenge

Late Night Packet
Forensics Easy 100 pts
The SOC team captured network traffic during a suspected data exfiltration. You receive a .pcap file. Your goal is to find what was stolen and recover the flag hidden inside the transferred data.
capture.pcap
How to solve it
  1. Open capture.pcap in Wireshark. Go to Statistics → Protocol Hierarchy — notice an unusually large amount of HTTP traffic.
  2. Filter to http and look for POST requests to an external IP. Right-click → Follow → HTTP Stream.
  3. The POST body is Base64-encoded. Copy the encoded blob.
  4. Decode it: echo '<blob>' | base64 -d — the output is a PNG image.
  5. Open the image to reveal the flag printed on it.
FLAG{pcap_foll0w_the_str34m}

Getting Started Tips

💡 Tip: Always run `file` and `exiftool` on every artefact first — metadata often contains the flag or a direct hint.
💡 Tip: For PCAP challenges, use Wireshark's Statistics > Protocol Hierarchy to understand traffic composition, then Follow TCP/HTTP Streams for content.
💡 Tip: Memory dumps: start with `windows.pslist`, `windows.netscan`, and `windows.cmdline` to map the incident before digging deeper.
💡 Tip: Steganography tools to try in order: `strings`, `exiftool`, `steghide`, `zsteg` (for PNGs), and `binwalk` for embedded files.