Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
In this lab, you will face a realistic attack scenario that combines post-incident forensic analysis and basic reverse engineering. A prestigious artificial intelligence company suffered a remote intrusion outside working hours, and you have been assigned as the analyst responsible for reconstructing the events and discovering what the attacker left behind.
In this lab you will learn:
👉 This challenge is solved inside a preconfigured virtual machine for forensic analysis. You do not need to access the compromised machine or use any dangerous external tools: you will analyze files already collected by an incident response team.
1https:/cybersecurity-machines/metadata-investigation-lab.ova
analyst:4geeks-lab
.1/home/analyst/Documents/incident_dump/
During the early hours of June 12, 2025, the backup server of Quantum Forge Inc., an artificial intelligence startup, was accessed remotely by a user who should not have logged in at that time: svc-backup
.
After reviewing the logs, the team detected that an external binary was downloaded and executed, and a password-protected compressed file appeared.
The cybersecurity team performed a controlled extraction of evidence from the compromised server (Windows Server) and provided you with the key information so you can perform a complete analysis in this secure lab machine (Linux).
Among the files provided, there is one that contains traces of suspicious activity... a sort of diary of what happened. If you mentally arrange the events, you will understand how it all began.
You will find references to processes launched by automated commands, even to software downloaded from the internet. It may not be a coincidence that a binary is also included among the files provided.
Exploring the executable changepass.exe
could give you more than one clue. If you see a strange string with unreadable characters or with = at the end... it’s worth checking if it hides something.
Among the files provided, there is one that seems to be protected. What do you think you could use to open it?
If you succeed, inside you will find something that many seek and few find.
When you find the flag, you will have completed one of the most realistic challenges in the lab.
Good luck, Forensic Analyst!
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration
Difficulty
intermediate
Average duration
2 hrs
Technologies
windows
engineering-reverse
base64
cybersecurity
forensics
incident response
A02:2021 - Cryptographic Failures
A05:2021 - Security Misconfiguration