Forensics¶
Table of Contents¶
Overview¶
Techniques for analyzing logs, network captures, file systems, and other artifacts to reconstruct events or extract hidden data.
Topics Covered¶
PCAP / network analysis — Inspecting packet captures with Wireshark or scripted tools to extract credentials, files, C2 traffic, or flags.
Log analysis / SIEM — Querying structured log data using KQL (Kusto Query Language) or similar to identify attacker activity, lateral movement, or exfiltration.
File carving — Extracting embedded files from disk images, memory dumps, or binary blobs.
Disk image analysis — Mounting and inspecting .img files for hidden files, deleted data, or file system artifacts.
Steganography — Recovering data hidden within image or audio files.
EXIF metadata — Extracting embedded metadata from image files including GPS coordinates, camera model, timestamps, and author fields.
Quick Reference¶
PCAP Analysis with Wireshark¶
# Open in Wireshark
wireshark capture.pcap
# Filter by protocol
http / dns / ftp / smtp
# Follow TCP stream: right-click packet → Follow → TCP Stream
# Export objects: File → Export Objects → HTTP
Disk Image Mounting¶
# Mount a raw disk image
sudo mount -o loop floppy.img /mnt/image
# Inspect with file system tools
ls /mnt/image
strings floppy.img | grep -i flag
File Carving¶
EXIF Image Metadata¶
EXIF (Exchangeable Image File Format) data is metadata embedded in image files (JPEG, TIFF, etc.) by cameras and photo apps. It can contain GPS coordinates, timestamps, device information, and author/copyright fields. All of these are useful for CTF reconnaissance.
# Install exiftool
sudo apt install libimage-exiftool-perl
# Dump all EXIF metadata
exiftool image.jpg
# Extract GPS coordinates only
exiftool -GPSLatitude -GPSLongitude -GPSPosition image.jpg
# Extract all metadata from all images in a directory
exiftool /path/to/images/
# Output as JSON
exiftool -json image.jpg
Common CTF-relevant EXIF fields:
| Field | Description |
|---|---|
GPS Latitude / GPS Longitude |
Location where the photo was taken |
GPS Position |
Combined lat/lon in degrees-minutes-seconds |
Date/Time Original |
When the photo was taken |
Make / Camera Model Name |
Device manufacturer and model |
Artist |
Photographer or author field |
Copyright |
Copyright string, sometimes contains clues |
Comment |
Free-text comment field |
Converting GPS coordinates:
EXIF stores GPS as degrees/minutes/seconds (DMS). To look up a location, paste the DMS string directly into Google Maps or Google Earth search:
Or convert to decimal degrees manually:
References¶
Challenges¶
| Source | Name |
|---|---|
| Holiday Hack Challenge 2024, Act I | Hadware Part I |
| Holiday Hack Challenge 2025, Act III | Gnome Tea |