THE CASE OF THE STOLEN SZECHUAN SAUCE

375

CTFs & Images

Test Images
  • General
  • Memory
  • Windows
CTFs
  • Hacking
  • Malware
  • Memory

This lab is for learning and practicing forensics! We will be providing training for free through a series of upcoming posts on how to solve the case!

TARGET AUDIENCE


Experienced digital forensics Jedi Masters who want a fun case.


Aspiring forensics folks who want to learn and practice.


Teachers, Professors, Mentors, and Students are welcome to use these materials so long as credit is given to this site and its authors.

GAME-ISMS


With training in mind, there are intentional (and unintentional) mistakes in the data. The timelines are sometimes compressed. For example, the time between the victim’s notification and when someone acquired the images does not make sense in the real world. Some of the adversary activities are stealthy, funny, or enable training efforts. However, the attack mirrors real-world adversary tactics, techniques, tools, and procedures. Consequently, it will support training and real-world incident preparedness.