This directory contains a set of security/crypto challenges for the purposes of forensic analysis.
It is my recommendation that if you are inexperienced in these sorts of challenges or do not have a thorough understanding of the inner workings of Linux systems that you start on something easier. Much easier! These challenges would put a lot of strain on even the most seasoned and experienced forensic analysts, crypto experts and security professionals!
Drop me an e-mail if you manage to solve any of them I would really like to hear from you and how far you got on solving them.
Need Support or think you solved it?
/k\ /e\ /i\ /t\ /h\ /.\ /s\ /m\ /i\ /t\ /h\ /@\ /u\ /n\ /s\ /e\ /e\ /n\ /.\ /i\ /s\
Pizza and Beer donations...