# Mitre 2017

## Forgotten - Forensics \[50 pts] \[Not Solved]

> Description Here

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUyXe9mWtiitHpVHJ%2F-MdrVM3hZMmkiIfY18jI%2Ff.zip?alt=media&token=46283752-dd15-4d2d-99f1-581211c3405f>" %}
Forgotten
{% endfile %}

Solution

Flag:

## Lorem ipsum - Grab Bag \[99 pts] \[Not Solved]

> You may have to crank up the speakers, which is not always desirable.

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUyXe9mWtiitHpVHJ%2F-MdrWK2-AAaPCiuvZKYK%2Fgb1.zip?alt=media&token=cdef7d2b-85c5-4a0a-8ece-486090057510>" %}
Lorem ipsum
{% endfile %}

Solution

Flag:&#x20;

## 101 gnisreveR - Binary \[100 pts] \[Not Solved]

> ?elif siht esrever uoy naC

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUSR8Vc0Rxe4kYuhB%2F-MdrUnuvXsrAMuP5I0u6%2Fb1_d91cbfa847314ccef08d13a235ca3ff308d81588.zip?alt=media&token=673b613c-f4d2-4809-802f-29e8991815fd>" %}
b1
{% endfile %}

Solution

Flag:

## Onyxia - Forensics \[100 pts] \[Not Solved]

> Odd groups go to the left, even groups go to the right. Seven and eight are whelp groups.

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUyXe9mWtiitHpVHJ%2F-MdrVm1iRA8puLz2XkPt%2Ff1_1d321c48ae0536dc282a037cdfe4b8f7498437ef.zip?alt=media&token=5b6e27be-5cb0-42b0-b570-9b6e05801016>" %}
Onyxia
{% endfile %}

Solution

Flag:

## Protected Page - Crypto \[150 pts] \[Not Solved]

> Description Here

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUyXe9mWtiitHpVHJ%2F-MdrV9mc1AbXSnRMczrE%2FProtected%20Page%20150.html?alt=media&token=7c2c6c39-f755-4f10-9401-f345cee33cd1>" %}
Protected Page
{% endfile %}

Solution

Flag:

## Ghost of a Chance - Forensics \[150 pts] \[Not Solved]

> The router is probably maximized, but the Internet is fine.

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUyXe9mWtiitHpVHJ%2F-MdrVaZXaUDhQYTUAN44%2Ff1.zip?alt=media&token=b3d23802-7fa5-45e5-96ae-011220f52fb0>" %}
Ghost of a Chance
{% endfile %}

Solution

Flag:&#x20;

## What IP Waiver - Forensics \[200 pts] \[Not Solved]

> An employee is suspected of stealing and exfiltrating sensitive intellectual property about a newly developed tool. A forensic acquisition was conducted on the suspects system and identified several files that may contain company intellectual property. Reconstruct and complete a SHA-1 hash of the original file.

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MdrUyXe9mWtiitHpVHJ%2F-MdrVw86DvRD8N7GQLBl%2Ff2_2e8c4814bf653049b9a6782c1b790221428aef2a.zip?alt=media&token=d3e9c949-2166-455e-bd3e-f895b4150915>" %}
IP Waiver
{% endfile %}

Solution

Flag:&#x20;
