Requirements : File carving and critical thinking. The challenge has several steps so keep track of what you do. It is suggested that you make copies of the files you are working with just in case you mess up. Similarly to Forensic #1, there are false positives in place to distract you. Examine eve...
A question about the photo: Would it be possible to learn what modifications were done to the woman in the photo? I have evidence that suggest she was not present in the original photo, but I feel like editing her into the photo would have been a lot of work (especially considering how convincing i...
Metasploitable2 is a vulnerable VM designed for use during the Metasploit Unleashed course. Just because it is for the course does not mean you can't use it to test your tools however. It just provides a legal medium to do so.
I think I've cracked this one, but I'm having an issue saving the file. Maybe someone can assist. When I save the file, then open it, it seems to want to add extra characters to the important modification needed to solve the problem. You can PM me if you need. You will need a second post in order t...
Learning subjects on their own is not bad, learning loads of things at once is suicide. The best way is to learn how all these things tie in. What happens when you send a request to a web server? What's actually happening in a 3 way handshake? How do different types of protocols work and how is it ...
Requirements : Google You cannot solve this mission by looking for the obvious signs of a poorly photoshopped image. You will need to have an understanding of jpeg compression levels. Once you realize what you need to do the answer will virtually glow at you. For those that complete the challenge a...