You will clearly figure out how to get the flag when you listen to the audio. This challenge is almost common in all CTF’s now!
The flag is : e5353bb7b575578bd4da1c898a8e2d7667
A blog about exploit development and reverse engineering.
Real Intrusions by Real Attackers, The Truth Behind the Intrusion
Digital Forensics & Incident Response & Reverse Engineering
random musings on DFIR topics
Findings, tips, and tools developed while trekking through the world of digital forensics
Your weekly roundup of Digital Forensics and Incident Response news
Random Thoughts from a Computer Forensic Examiner
behind the scenes
Trials and Tribulations of a DFIR life
For the noobs out there like me
The only guide you need!
gain,learn and share knowledge!!!!
Windows Logging Service (WLS), DFIR, etc.
Searching for, analyzing and recovering digital evidence
Three things cannot be long hidden: the sun, the moon, and the truth.