Gone for good
EasyDigital Forensics
Overview
An associate, Alex, accidentally deleted a vital Photo from his thumbdrive. We have been provided with a raw forensic image of the device, titled alex_image.dd. Our task is to perform a deep scan and find the image
Flag format: CTF{}
Lab Details
Prerequisites & Requirements
- Linux command line proficiency and comfort with sudo privileges
- Understanding that a .dd file is a raw, bit-for-bit copy of a storage medium
- Knowledge of how files are indexed (metadata) versus stored physically on disk
- Linux-based environment (Kali Linux, Parrot OS, or Ubuntu) with testdisk installed
What will you learn?
- File Carving: Recovering files based on headers and footers (magic bytes) rather than filesystem metadata
- Unallocated Space Analysis: Searching disk areas marked as "empty" but containing latent data
- Data Integrity: Working with forensic images to ensure original evidence remains untainted
- Signature Matching: Identifying specific file types (like PNG) by their unique hex signatures
Tools
- TestDisk/PhotoRec for file carving and partition recovery
- File Command to verify the file type of recovered data
- Hex Editor (Optional) for manual verification of file headers
Job Positions
Soc Analyst
Tags
Disk ImageData RecoveryFat32Deleted FilesImage Acquisition