Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Disk Analysis
After Karen started working for ‘TAAUSAI,’ she began doing illegal activities inside the company. ‘TAAUSAI’ hired you as a soc analyst to kick off an investigation on this case.
You acquired a disk image and found that Karen uses Linux OS on her machine. Analyze the disk image of Karen’s computer and answer the provided questions.

Created By AccessData® FTK® Imager 4.5.0.3
Case Information:
Acquired using: ADI4.5.0.3
Case Number:
Evidence Number:
Unique Description:
Examiner:
Notes:
--------------------------------------------------------------
Information for D:\Users\Mawso3a\Desktop\FirstHack.ad1:
[Custom Content Sources]
Horcrux.E01:Partition 5 [14304MB]:NONAME [ext4]|[root]|boot|*(Wildcard,Consider Case,Include Subdirectories)
Horcrux.E01:Partition 5 [14304MB]:NONAME [ext4]|[root]|var|log|*(Wildcard,Consider Case,Include Subdirectories)
Horcrux.E01:Partition 5 [14304MB]:NONAME [ext4]|[root]|root|*(Wildcard,Consider Case,Include Subdirectories)
[Computed Hashes]
MD5 checksum: f7c4fab05c3a7473ed59b549eef5a509
SHA1 checksum: 8875899aa4c6498b410250d48503f64e283528e9
Image information:
Acquisition started: Tue May 25 15:33:49 2021
Acquisition finished: Tue May 25 15:34:32 2021
Segment list:
D:\Users\0xMohammed\Desktop\FirstHack.ad1
Image Verification Results:
Verification started: Tue May 25 15:34:33 2021
Verification finished: Tue May 25 15:34:39 2021
MD5 checksum: f7c4fab05c3a7473ed59b549eef5a509 : verified
SHA1 checksum: 8875899aa4c6498b410250d48503f64e283528e9 : verified
I opened the .ad1 file using FTK Imager:

Looking inside boot, we find she was using kali linux:

access.log is in /var/log/apache2:

We can right click on the file and export file hash list:

Opening the file we find the MD5:


In root/Downloads we find Mimikatz:


In root there is .bash_history:
msfconsole
systemctl status postgresql
systemctl enable postgresql
systemctl start postgresql
msfconsole
msfdb init
msfconsole
shutdown now
touch snky snky > /root/Desktop/SuperSecretFile.txt
cat snky snky > /root/Desktop/SuperSecretFile.txt
msfconsole
clear
history
clear
history
whoami
hack
do hack
do hack please
i am a hacker
how to hack
pwd
ls
ls -la
touch delete-me.txt
rm delete-me.txt
ls
cd Documents/
mkdir myfirsthack
cd myfirsthack/
touch hellworld.sh
vim hellworld.sh
chmod +x hellworld.sh
./hellworld.sh
touch firstscript
vim firstscript
chmod +x firstscript
./firstscript
vim firstscript
cp firstscript firstscript_fixed
ls
vim firstscript
vim firstscript_fixed
./firstscript_fixed
flag<this is a flag>
ifconfig
cd ..
cd..
cd ..
cd /var/log/
ls
cd ..
cd ~
ls
pwf
pwd
top
wall -h
wall yolo
ls
pwd
cd ..
ls
cd home/
ls
cd /root
ls
cd ../root
cd ../root/Documents/myfirsthack/../../Desktop/
sl
ls
cd ../Documents/myfirsthack/
netstat
echo bob.txt
touch bob.txt
echo "If you're still reading this file, scream cake."
echo "Seriously, we'll give you a hint to answer question if you scream cake."
sudo visudo
ls
sudo ifng
ifconfi
apt get moo
sudo apt get moo
sudo apt install moo
sudo apt-install moo
sudo apt-get install moo
lol Castro just failed at all these commands. Someone pat him on the back.
I tried okay
history > history.txt
binwalk didyouthinkwedmakeiteasy.jpg
clear
history
exit
touch keys.txt
pwd
So the path of the super-secret file is :
/root/Desktop/SuperSecretFile.txt

Looking also in .bash_history, we find:
binwalk didyouthinkwedmakeiteasy.jpg

In Desktop folder, there is a file called Checklist. Exporting the file, we find:


/var/log/apache2/ is empty which suggests that Apache was not run:

There is a picture called irZLAohL.jpeg:
There is a picture called irZLAohL.jpeg:
Looking inside firstscript_fixed in documents:

The expert is Young
Looking in auth.log:

The last directory change was to myfirsthack:

