forensicsmedium
Silk Road
hackerlab
Task: a 4 GB VirtualBox VM disk image (Debian, user 'ross') themed around Silk Road with 3 hidden flag fragments. Solution: extract ext4 from VMDK with 7z, recover fragment 1 from bash_history (failed deletion), fragment 2 from PNG tEXt Author metadata in Trash, fragment 3 from Firefox backup logins decrypted with firepwd.py.
$ ls tags/ techniques/
steganographyext4bash_historyvmdkdisk_forensicspng_metadatakeepassxcvirtualboxfirefox_decryptveracryptsilk_roadross_ulbrichtopsectrash_analysismulti_fragment_flag
vmdk_extraction_with_7zext4_analysis_without_mountingbash_history_forensicspng_text_chunk_metadata_extractionfirefox_password_decryption_firepwdmulti_fragment_flag_assemblytrash_artifact_analysisbinary_file_comparison
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]