Forensics
Forensics challenges involve recovering evidence from disk images, memory dumps, packet captures, and log files. Skills include file carving, steganography, timeline analysis, and artifact interpretation.
Digital forensics is the process of acquiring, preserving, and analysing digital evidence. Investigators examine hard drives, memory snapshots, network captures, and logs to reconstruct what happened, when, and by whom.
It is crucial for incident response, legal proceedings, and malware analysis. The discipline blends operating-system internals knowledge with investigative methodology and a strict chain-of-custody mindset.
In a CTF, you receive a file (PCAP, disk image, memory dump, photograph, archive) and must uncover a hidden flag or answer questions about an attack. The flag may be deleted, buried in metadata, encoded in an image, or hidden inside encrypted network traffic.
Common workflow: identify the artefact type → use the appropriate tool (Wireshark, Volatility, Autopsy, ExifTool) → search for patterns or anomalies → extract and decode the flag.
Sample Challenge
.pcap file.
Your goal is to find what was stolen and recover the flag hidden inside the transferred data.- Open
capture.pcapin Wireshark. Go to Statistics → Protocol Hierarchy — notice an unusually large amount of HTTP traffic. - Filter to
httpand look for POST requests to an external IP. Right-click → Follow → HTTP Stream. - The POST body is Base64-encoded. Copy the encoded blob.
- Decode it:
echo '<blob>' | base64 -d— the output is a PNG image. - Open the image to reveal the flag printed on it.