In addition to the USB key drive image, three network traces are also available—these were provided by the network administrator and involve the machine with the missing hard drive. The suspect is the primary user of this machine, who has been pursuing his Ph.D. at the University since 1972.
case1.zip (3.4 MB)
F 201.1: Verifying Hash Values (5 pts)
Open a PowerShell window and execute these commands, as shown below.Verify that the MD5 value matches the value shown below. If it does not, re-download the evidence file.
cd Downloads Get-FileHash -Algorithm MD5 case1.zip Get-FileHash -Algorithm SHA1 case1.zipThe flag is the first portion of the SHA1 address, covered by a green rectangle in the image below.
You see four files, as shown below.
Make these selections:
Failed Ingest Module
In Sept, 2025, the process of adding the data source failed because one of the ingest modules crashed.If that happens, read the error message to identify the failed module.
Then repeat the process to add the data module, but uncheck the failed module in the "Configure Ingest" list.
F 201.2: Mother and Child (5 pts)
Find the image of a mother rhinoceros and her child. That's the flag.(If you are using an automated CTF scoreboard, enter the filename of the image as the flag.)
F 201.3: Hard Drive (5 pts)
Find the location of the missing hard drive. That's the flag.
Posted: 8-26-22
F 201.4: Email Address (10 pts extra)
There are two files containing an email address at MIT. Only one of the files has a real filename. (A filename beginning with "Unalloc" is a fake filename generated by Autopsy for files recovered from unallocated clusters.)The flag is the real filename, which does not begin with "Unalloc".