The Case of The Stolen Szechuan Sauce
The Case of The Stolen Szechuan Sauce
Resources for getting started will be provided at the bottom of the post. Additionally, individual articles on
working through the artifacts and solving the case will be posted in the coming weeks! So be sure to check
back soon.
PURPOSE
This lab is for learning and practicing forensics obviously! We will also be providing training for free through
a series of upcoming posts on how to solve the case!
TARGET AUDIENCE
Experienced digital forensics Jedi Masters who want a fun case as well as aspiring forensics folks who want to
learn and practice.
Teachers, Professors, Mentors, and Students are welcome to use these materials so long as credit is given to
this site and its authors.
GAME-ISMS
With training in mind, there are intentional (not to mention unintentional) mistakes in the data. Consequently,
the timelines are sometimes compressed. For example, the time between the victim’s notification and when
someone acquired the images does not make sense in the real world. Likewise, some of the adversary activities
are stealthy, funny, or enable training efforts. However, the attack mirrors real-world adversary tactics,
techniques, tools, and procedures. Consequently, it will support training and real-world incident preparedness.
The answers for the Stolen Szechuan Sauce are here. A humble recommendation: require that students produce
screenshots with their names in a report explaining their findings since the answers are here.
CLIENT INTERVIEW
This interview was conducted while retrieving the artifacts from the system using FTK Imager Lite and a
Redline Collector.
Where were the files in question stored?
On the bellllcchhhh File Server on the Domain Controller.
What was the Operating System version of this server?
Belch Whatever that idiot Jerry put on there a few years back.
May I have a network map where the affected systems were located?
Sure. All the systems were loc-bellllch-ated in 10.42 something something
Were there any other systems or files you are concerned about?
Yeah, certainly. Morty is ramble belllch rambling on about something he might have had on there. Also, there
was a secret about Bebelllech …. Beth on the server. So if you find it, and YOU TELL ANYBODY I WILL
KILL YOU!
(The threat here matches a character from a popular cartoon character and not any real threat so stay calm).
Note: This incident occurred at an organization located in Colorado in September. So, this places the incident
at UTC -6. Keep this in mind when looking at the output of various tools.
The questions here are not a full example of what to ask during a breach. It’s part of the training scenario
as much as anything else here. It’s also a decent starting point to your investigation would be going through the
questions for the exercise and trying to answer those and use them as pivots.
THE ARTIFACTS
Separate posts will start appearing soon on how to approach these artifacts, and how to answer the questions
above.
To get the E01’s you may need to use Firefox in a Private Window, hit the back button, select the file,
and hit Download.
However, if you are worried about storage and bandwidth ditch the protected files and
the pagefiles for now.