This material was developed with funding from the
National Science Foundation under Grant # DUE 1601612
Ethical Hacking Case 1A
A sneaky hacker has been up to no good but his name and crime are unknown to you. He has been hiding himself in the shadows skulking around. He has used his hacking skills for an evil motive: to exploit everyone. You are the detective that has been assigned to the case. You will need to investigate the scene to find pieces of evidence and clues to the hacker’s identity and his crime. You will need to use your problem solving skills, information technology knowledge, and perhaps a bit of intuition to put the pieces of this mysterious puzzle together. To solve the crime and close the case file type in the missing bits of information: the exploit, the hacker’s name, and complete a task that will be revealed to you later.
#2: Hacker's Name
When you have figured out the items to enter in the case log, enter them here and they will be saved.
Write an email as if you were the hacker. Use all the knowledge you have and direct users to the site.
Congratulations! You solved the case.
#3: Assigned task
Microsoft Windows [Version 10.0.18362.356]
(c) 2019 Microsoft Corporation. All right reserved.
Decrypt the message and type it in the space below. Then click the submit button.
Eco qyyqvo rkmusxq dy qod dro zkccgybn pyb
firstname.lastname@example.org dy yzox dro vymuon lyh.
Click on the Case Folder to fill in the answers as you find the clues.
As you find clues they will be added to your Resources folder.
In the Case Folder under #3 Assigned Task, write an email as if you were the hacker. Use all the knowledge you have and direct users to the site.