Cyber Forensics

For Linux Users,

  1. Exiftool

To install this tool, open your command line/terminal and type

sudo apt install exiftool

  1. Ghex

To install,

sudo apt install ghex

  1. Binwalk

To install,

sudo apt install binwalk

  1. Steghide

To install,

sudo apt install steghide

  1. Fcrackzip

To install,

sudo apt install fcrackzip

  1. Zbarimg

To install,

sudo apt-get install zbar-tools

  1. Pdfcrack

To install,

sudo apt-get install pdfcrack

  1. Wireshark

To install,

sudo apt install wireshark

To install Wireshark in Windows,

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

Or,

https://www.wireshark.org/download.html

For more info, visit https://wiki.bi0s.in/steganography/roadmap/ & https://wiki.bi0s.in/forensics/roadmap/

How to use VirtualDesk? (For non-linux users)

  1. Open Traboda https://app.traboda.com/
  2. Click on "Start VirtualDesk"

Image Not Showing Possible Reasons
  • The image file may be corrupted
  • The server hosting the image is unavailable
  • The image path is incorrect
  • The image format is not supported
Learn More →

  1. Choose Ubuntu (SSH) and Start VirtualDesk
  2. To download the challenge files , type
    wget https://bashupload.com/ct7ef/Training.zip
  3. Unzip the file by typing,
    unzip Training.zip
  4. The above listed tools are already installed in VirtualDesk.
  5. You can start working on the challenges along with us!

Challenge Files:

  1. https://mega.nz/folder/su40VCyZ#z8_Zzp54D-upMhbI2D8ujw
  2. https://bashupload.com/ct7ef/Training.zip

Learning Round

Challenges are available at :

  1. https://app.traboda.com/contest/inctfj-21-lr/challenges
  2. https://mega.nz/folder/BmhnlQzb#5_zGDCFuTHuDbyCqkePsMQ