
1. Case Overview:The IMF is hit by a cyber attack compromising sensitive data. Luther sends Ethan to retrieve crucial information from a compromised server. Despite warnings, Ethan downloads the intel, which later becomes unreadable. To recover it, he creates a forensic image and asks Benji for help in decoding the files.Q1. What is the MD5 hash of the potentially malicious EXE file the user dow..

1. Case Overview:An employee at a large company was assigned a task with a two-day deadline. Realizing that he could not complete the task in that timeframe, he sought help from someone else. After one day, he received a notification from that person who informed him that he had managed to finish the assignment and sent it to the employee as a test. However, the person also sent a message to the..

해당 문제는 CyberDefenders의 CorporateSecrets Lab 문제에 대한 풀이입니다Q1. What is the current build number on the system?FTK Imager를 통해 SOFTWARE를 추출하고 Registry Explorer로 열어 Current Version-Current Build Number를 보면 확인 할 수 있다.Q2.How many users are there?FTK Imager에서 Users를 확인하면 사용자를 확인 할 수 있다.Q3.What is the CRC64 hash of the file "fruit_apricot.jpg"?CRC-64 hash cheksum이라 검색해보니 Toolkit Bay 사이트를 확인할 수 있었다.Q4. Wha..
보호되어 있는 글입니다.
보호되어 있는 글입니다.
보호되어 있는 글입니다.