Friday, January 21, 2022

BlueTeam CTF Challenges - CyberDefenders

 BlueTeam CTF Challenges - CyberDefenders with Paraben's E3

CyberDefenders is a training platform focused on the defensive side of cybersecurity, aiming to provide a place for blue teams to practice, validate the skills they have, and acquire the ones they need.

Download Challenge 

DIGITAL FORENSICS: CTF 

SHA1SUM 88a22f6ad6d140c9151e6983b894c6eb6c64735d


1  What is the computer name of the suspect machine?


3 What was the DHCP LeaseObtainedTime?


4 What is the computer SID?


5 What is the Operating System(OS) version?





6 What was the computer timezone?




17 It looks like the suspect user deleted an important diagram after his conversation with the external attacker. What is the file name of the deleted diagram?


20 What are the serial numbers of the two identified USB storage?


24 Using prefetch, determine when was the last time ZENMAP.EXE-56B17C4C.pf was executed?

25 A JAR file for an offensive traffic manipulation tool was executed. What is the absolute path of the file?

27 Shellbags shows that the employee created a folder to include all the data he will exfiltrate. What is the full path of that folder?


29. Provide the name of the directory where information about jump lists items (created automatically by the system) is stored?


30 Using JUMP LIST analysis, provide the full path of the application with the AppID of "aa28770954eaeaaa" used to bypass network security monitoring controls.



อ่านเพิ่มเติม Cloud Forensics:Google Drive forensics with Paraben's E3
                      Digital forensics:P2CO-P2C Certified Operator

ที่มา:   cyberdefenders.org 
           


หมายเหตุ:เนื้อหาในเว็บไซต์นี้มีขึ้นเพื่อวัตถุประสงค์ในการให้ข้อมูลและเพื่อการศึกษาเท่านั้น

* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย  รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ


#WINDOWSFORENSIC #COMPUTERFORENSICS #DFIR #FORENSICS #DIGITALFORENSICS #COMPUTERFORENSIC #INVESTIGATION #CYBERCRIME #FRAUD

No comments:

Post a Comment