A USB drive was found in the parking lot.
You've been asked to investigate. Five short challenges, each one teaches a real skill cyber analysts use every day. No experience needed. Hints are always available.
Web Recon — What's Underneath the Page?
curl to download a page raw, then grep to filter for words like "password," "admin," or "backup."
Your job: Download the recovered web page with curl, then filter the output with grep to find the credential the developer left behind. Type each suggested command (or click Insert) and press Enter.
curl -s http://anonyhost.local/index.html
Download the page source. -s silences curl's progress bar so you only see the response body.
curl -s http://anonyhost.local/index.html | grep -iE "pass|admin|cred"
Pipe the page through grep to filter for credential-related words. -i is case-insensitive; -E enables extended regex (the | means "or").
What credentials did the developer leave in an HTML comment? (format: user / password)
Password Cracking — Why Weak Passwords Fall Fast
Type any password to see how long a brute-force attacker would take to guess it. Try a few. Notice what changes the time most: length, character variety, or whether the password is on a known wordlist.
A captured hash from the suspect's system is in hashes.txt. Use John the Ripper with the rockyou.txt wordlist (a real list of 14 million leaked passwords) to crack it.
cat hashes.txt
Peek at the captured hash. This is what the attacker has — not the original password.
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
Run John against the rockyou.txt wordlist. John will hash each candidate and compare it to the captured hash until one matches.
john --show hashes.txt
Show the cracked password in cleartext. After cracking, John saves results in a "pot file"; --show reads them back.
File Recovery — Deleted Isn't Gone
foremost and scalpel scan raw disk images for known file headers (the "magic bytes") and reconstruct files even after the filesystem says they're gone.
Your job: The USB image (usb.img) looks empty when mounted, but it isn't. Carve out the deleted files with foremost, then read the recovered notes for your next lead.
ls /mnt/usb_image/
Confirm what the mounted filesystem reports. Looks empty, right?
foremost -t all -i usb.img -o ./recovered/
Carve the raw image. -t all looks for every supported file type, -i is the input image, -o is the output folder.
cat ./recovered/txt/network_notes.txt
Read the carved-out note. The other recovered files are decoys.
Network Scanning — Find the Weak Door
nmap sends a probe to every IP in a range and reports which ports are open and what software is listening. Defenders run it weekly to find services that shouldn't be running. Attackers run it as their first move on a target.
Your job: The recovered note pointed at subnet 10.10.10.0/24. Run a service scan, identify the vulnerable host, then run a deeper scan on that host to confirm.
nmap -sV 10.10.10.0/24
Service-version scan across all 256 IPs in the subnet. -sV tells nmap to identify what software is running on each open port.
nmap -A 10.10.10.30
Aggressive scan focused on the suspect host. -A turns on OS detection, version detection, script scanning, and traceroute.
Which IP is running an unencrypted, plain-text-authentication service? (format: 10.10.10.X)
Steganography — Data Inside Data
exiftool exposes metadata embedded in image headers, and steghide extracts data hidden in the pixel-level least-significant bits.
Your job: A vacation photo (vacation_2025.jpg) was pulled off the vulnerable Telnet host. Inspect its metadata, then extract any hidden payload.
file vacation_2025.jpg
Confirm the file type by reading its magic bytes. Don't trust extensions; trust the header.
exiftool vacation_2025.jpg
Read every metadata field. Watch for non-standard tags or oddly-sized comment fields — that's where data often hides in plain sight.
steghide extract -sf vacation_2025.jpg -p "<passphrase>"
Extract the hidden payload. -sf is the source file, -p takes the passphrase. Steghide hides data in JPEG pixel coefficients in a way that is invisible to the eye, and protects the payload with a passphrase. You found the passphrase in the recovered note from Stage 3 — use it here.
cat secret.txt
Read the extracted file.
If any of that felt fun, you'd probably enjoy the rest of cybersecurity. Talk to your instructor about the program at Stark State.