Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
In this lab, you will investigate a possible intrusion on a Linux system. The only initial clue is an image of the Mona Lisa that seems harmless... but everything changes when you discover it hides suspicious metadata.
In this lab you will learn:
exiftool
👉 This challenge is solved inside a preconfigured Linux virtual machine.
1https:/cybersecurity-machines/metadata-investigation-lab.ova
Import the machine into VirtualBox.
Log in as the user artlover:4geeks-lab
.
The system includes essential tools such as:
exiftool
bash
, grep
, ps
, crontab
The system you are auditing contains an image called monalisa.jpg
. Something about it doesn't add up: it was modified in the future, and inspecting its metadata reveals suspicious paths and the name of a user who shouldn't exist.
If you manage to completely disable the attacker's infrastructure, you will gain access to the full challenge flag.
Analyze the metadata of the monalisa.jpg
image located in artlover
's home directory.
Look for fields like Comment
, Note
, or anomalous dates.
Follow the clues to available files that may contain suspicious credentials.
Access the attacker's user account with the credentials you find.
Check their home directory. There you will find a fragment of the flag.
Discover malicious cron jobs running.
Remove the cron job and stop the persistent task.
If you have eliminated the malicious behavior, switch to the intruder
user and run the verification command:
1validate-challenge-finished
This command will validate if you have deleted the malicious process and will give you the second part of the flag.
This lab is designed to help you think like a real forensic analyst who follows clues, tracks malicious actions, and contains an ongoing incident.
Only if you complete each phase of the analysis will the system reveal the whole truth.
Are you ready to look beyond the mirror?
Good luck, Analyst!
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
digital forensics
metadata-analysis