Главная
Study mode:
on
1
Cyber5W Linux Forensics CTF
2
CTF Case Scenario
3
How this walkthrough works
4
Download images and setup
5
Verify Expert Witness Format File E01 with ewfverify
6
Mount the suspect disk image with ewfmount and mount
7
Get disk partition offsets with mmls and bc
8
Mount the partition based on disk offset with mount
9
Access the suspect system directly with chroot
10
MATE Q1
11
MATE Q2
12
MATE Q3
13
MATE Q4
14
MATE Q5
15
MATE Q6
16
Switching to the Kubuntu image
17
KUBUNTU Q1
18
KUBUNTU Q2
19
KUBUNTU Q3
20
KUBUNTU Q4
21
KUBUNTU Q5
22
Clean up and conclusions
Description:
Dive into a comprehensive Linux forensics tutorial that walks you through a Capture The Flag (CTF) challenge focused on investigating internal policy violations. Learn how to mount and analyze forensic images using tools like ewfmount, mmls, and mount to gain direct access to suspect data. Explore techniques for verifying Expert Witness Format files, calculating disk partition offsets, and using chroot to view suspect data natively. Follow along as the instructor tackles questions related to both MATE and Kubuntu systems, demonstrating practical forensic analysis skills applicable to real-world scenarios. Gain hands-on experience in Linux forensics and enhance your ability to investigate suspicious user activities on Linux systems.

Linux Forensics with Linux - CTF Walkthrough

DFIRScience
Add to list
0:00 / 0:00