Gone for good

EasyDigital Forensics

Overview

An associate, Alex, accidentally deleted a vital Photo from his thumbdrive. We have been provided with a raw forensic image of the device, titled alex_image.dd. Our task is to perform a deep scan and find the image
Flag format: CTF{}

Lab Details

Prerequisites & Requirements

  • Linux command line proficiency and comfort with sudo privileges
  • Understanding that a .dd file is a raw, bit-for-bit copy of a storage medium
  • Knowledge of how files are indexed (metadata) versus stored physically on disk
  • Linux-based environment (Kali Linux, Parrot OS, or Ubuntu) with testdisk installed

What will you learn?

  • File Carving: Recovering files based on headers and footers (magic bytes) rather than filesystem metadata
  • Unallocated Space Analysis: Searching disk areas marked as "empty" but containing latent data
  • Data Integrity: Working with forensic images to ensure original evidence remains untainted
  • Signature Matching: Identifying specific file types (like PNG) by their unique hex signatures

Tools

  • TestDisk/PhotoRec for file carving and partition recovery
  • File Command to verify the file type of recovered data
  • Hex Editor (Optional) for manual verification of file headers

Job Positions

Soc Analyst

Tags

Disk ImageData RecoveryFat32Deleted FilesImage Acquisition