Skip to content

๐Ÿ” Category: Digital Forensics

Below is a list of Digital Forensics challenges, dig deep, who knows what you may find?


๐Ÿ”น Challenge 1: Forgotten Partition

Points: 250
Description: A suspect's USB drive was confiscated during a raid. However, it seems to be wiped cleanโ€”or is it? Your task is to analyze the disk image and uncover any hidden files or partitions.

Can you recover the hidden files/deleted files?

Flag Format: Not Specified
Attachment: flag_forensics_challenge.zip


๐Ÿ”น Challenge 2: Echoes in the WAV

Points: 300
Description: Challenge Description: An audio file was intercepted from a suspected data smuggler's communication. It appears to be just static noise... or is it? Intelligence suspects that a secret message lies hidden within. Can you extract what lies beneath the static?

Flag Format: flag{}
Attachment: echoes_in_the_wav.zip


๐Ÿ”น Challenge 3: Behind the Verveine

Points: 400
Description:

The Sentinels slipped through โ€” but their ride didnโ€™t.

Our team cracked open the vehicle they left behind. Hidden deep in the car's onboard system, past wiped logs and ghost drives, we recovered one thing a suspicious-looking disk.img file. No name. No metadata. Just staticโ€ฆ or so it seems. "Neither the pigeons nor the Ravens were used, then what shall it be in this digital world?"

Intel says someone, somewhere, already managed to scrape out part of the secret โ€” they claim the "flag" was found in an unknown baseXX encoding. But thatโ€™s it. No format, no key, no confirmation.

Your mission Crack this. Find whatโ€™s buried inside that file. Use the one lead youโ€™ve got โ€” that this thingโ€™s cloaked in some form of base encoding, something dirtier. Youโ€™ll have to test, dig, and peel until the real message bleeds out.

Shadow Nexus leaves no traceโ€ฆ but this time, they left a digital scar. Find it. Decode it. And expose their next layer.  

Flag Format: Not Specified
Attachment: disk.img