Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
A cyberpunk private investigator analyzing digital evidence.

Antisyphon Cyber Range: Forensics Fun!

Posted on September 13, 2023September 13, 2023 By

Hey everybody!

Digital forensics is all about finding the evidence and recreating the story. This week, we have three connected challenges that build, one on top of another, plus an extra reverse engineering challenge for dessert! Think you can solve this week’s whodunit?

For screenshots and descriptions of this week’s additions, see below.

Good luck and have fun!
The Cyber Range Team

A cyberpunk private investigator analyzing digital evidence.
A cyberpunk private investigator analyzing digital evidence.

P.S. If you’re not already signed up for the BHIS Antisyphon Cyber Range, the following page has screenshots, info, and, of course, a link where you can sign up and join in the fun:

https://www.antisyphontraining.com/cyber-range/


An attacker breached your computer and left behind a mysterious file. IT says it looks like a meaningless memory dump, but you're worried the attacker may have been compressing data to exfiltrate. Can you take a closer look and see if you can find anything?
Memories… Like the Corners of My Mind…
Hey I found this old VM (~5G) sitting around. I stopped using it because I was pretty sure it got hacked and I didn't want to bother cleaning it up. Unfortunately, I seem to have forgotten all of the credentials....
Time to break out the forensics tools!
There's something fishy going on with users in this VM, which is same one as last time. Get to the bottom of it!
Could it be malware?
A piece of malware in this VM (same as previous challenge) has been keeping track of passwords. Figure out how and tell me what Steve's old one was. This problem is pretty difficult. Solving this problem will involve multiple layers of investigation requiring skills in forensics, reverse engineering, and cryptography.
Forensics, reverse engineering, and crypto, eh? Outstanding!

Cyber Range Updates, News Tags:Cyber Range Updates, Forensics, Reverse Engineering

Post navigation

Previous Post: Miss our Anti-Cast, ‘XFS Forensics with xfs_d,’ with Hal Pomeranz?
Next Post: Join us for this week’s Anti-Cast with Jennifer Shannon!
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme