This CTF challenge is from AfricaFalls Digital Forensics contest , We have disk image that have a lot of information like password, registries, browser history etc…
We will investigate some useful informations! Be ready
# Challenge Information
Description
John Doe was accused of doing illegal activities. A disk image of his laptop was taken. Your task is to analyze the image and understand what happened under the hood.
Challenge Link & Author
CyberDefenders - Brave
DFIRScience Twitter Profile
# Walkthrough
1- What is the MD5 hash value of the suspect disk?
Just inspec the ad1.txt and you’ll find useful information about the disk image like the acquisition time and the checksum
1 | cat DiskDrigger.ad1.txt |
Answer: 9471e69c95d8909ae60ddff30d50ffa1
2- What phrase did the suspect search for on 2021-04-29 18:17:38 UTC? (three words, two spaces in between)
We found that the user used a chrome as his main browser! So we decide to get the database that contains the history of browsing. We can inspect it with DB Browser SQLite
After Opening the database you can search about the history and find the correct answer using the right timestamp

Answer: password cracking lists
3- What is the IPv4 address of the FTP server the suspect connected to?
Wait man! FileZilla is installed in our system. I am sure that we will find the information in filezilla.xml

Answer: 192.168.1.20
4- What date and time was a password list deleted in UTC? (YYYY-MM-DD HH:MM:SS UTC)
This is EASY DUDE! just check the Recycle Bin ! You’ll find your target !

Answer: 2021-04-29 18:22:17 UTC
5- How many times was Tor Browser ran on the suspect’s computer? (number only)
I guess this question is tricky! where is tor man !!! OK calm down you’ll find lnk file about tor but i think it’s fake one ! Let’s try an LNK Parser. I’ll use ericzimmerman tool !

Wow firefox.exe in TOR LNK file! This is Joke
Answer: 0
6- What is the suspect’s email address?
OK backing again to the browser history to check if the user visit a mailing website !

Answer: dreammaker82@protonmail.com
7- What is the FQDN did the suspect port scan?
He asked about port scan?? mmm I guess nmap is here ! Nmap are you here ?

Just i checked the PowerShell history. You’ll find it in AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine

Answer: dfir.science
8- What country was picture “20210429_152043.jpg” allegedly taken in?
I tried to inspect the metadata of the image and i found GPS position information!
1 | exiftool 20210429_152043.jpg |
Ok let’s try to find the country using GPS Coordinates Finder

Answer: Zambia
9- What is the parent folder name picture “20210429_151535.jpg” was in before the suspect copy it to “contact” folder on his desktop?
Shellbags explorer will solve our problem here! But wait man ! What are ShellBag artifacts?
ShellBags are a popular artifact in Windows forensics often used to identify the existence of directories on local, network, and removable storage devices. ShellBags are stored as a highly nested and hierarchal set of subkeys in the UsrClass
This registyr hive will save us : [root]\Users\John Doe\AppData\Local\Microsoft\Windows\Usrclass.dat
ٍ
Answer: Camera
10- A Windows password hashes for an account are below. What is the user’s password?
Just try an online hash cracker
ٍ
Answer: AFR1CA!
