Mini Linux Forensics - MUS22

You have been called to analyze a machine of an employee, the employee is suspected to misuse the firm machine by violating the firm policies. You are requested to investigate the employee machine to find any misuse artifacts. Examples of such artifacts are browsing illegal websites, downloading illegal images and illegal music files. Winners will receive 50% discount on all our courses and training found at https://academy.cyber5w.com/. Please contact us @cyber5w for more details.

Start Date

May. 01, 2022 8 AM GMT (Duration: 8 months)

CTF Mode

Individual

CTF Authors