Forensic
Train digital investigation skills by analyzing memory dumps, log files, network captures...
The computer forensics challenges are aimed at teaching you the methodologies, techniques and tools associated with digital investigation. This science consists in gathering evidence to understand the progress of actions carried out by an attacker on a computer or an information system.
44 Challenges
Results | Name | Number of points |
Difficulty |
Author | Note |
Solution | Date |
|
Deleted file | 5 | Manah | 5 | 24 May 2023 | ||
|
Capture this | 15 | Zey_Roxx | 2 | 20 October 2023 | ||
|
Command & Control - level 2 | 15 | Thanat0s | 10 | 16 February 2013 | ||
|
MasterKee | 15 | Ayweth20 | 1 | 8 November 2024 | ||
|
Oh My Grub | 15 | X-nO | 4 | 3 December 2022 | ||
|
Docker layers | 20 | mayfly | 1 | 7 June 2022 | ||
|
Windows - LDAP User KerbeRoastable | 20 | Podalirius | 3 | 17 November 2022 | ||
|
Windows - NTDS Secret extraction | 20 | Podalirius | 2 | 17 November 2022 | ||
|
Logs analysis - web attack | 25 | sambecks | 9 | 5 July 2015 | ||
|
Command & Control - level 5 | 25 | Thanat0s | 2 | 16 February 2013 | ||
|
Supply chain attack - Docker | 25 | Nishacid | 2 | 3 December 2022 | ||
|
Find the cat | 25 | Thanat0s | 8 | 28 July 2013 | ||
|
Ugly Duckling | 25 | eilco | 3 | 24 April 2017 | ||
|
Windows - LDAP User ASRepRoastable | 25 | Podalirius | 1 | 17 November 2022 | ||
|
Active Directory - GPO |