Ethical Hacking
Case 1A
This material was developed with funding from the
National Science Foundation under Grant # DUE 1601612
1/8
Back
Next
Restart
Ethical Hacking Case 1A
ENTER
A sneaky hacker has been up to no good but his name and crime are unknown to you. He has been hiding himself in the shadows skulking around. He has used his hacking skills for an evil motive: to exploit everyone. You are the detective that has been assigned to the case. You will need to investigate the scene to find pieces of evidence and clues to the hacker’s identity and his crime. You will need to use your problem solving skills, information technology knowledge, and perhaps a bit of intuition to put the pieces of this mysterious puzzle together. To solve the crime and close the case file type in the missing bits of information: the exploit, the hacker’s name, and complete a task that will be revealed to you later.
2/8
#2: Hacker's Name
That’s correct!
Resources
When you have figured out the items to enter in the case log, enter them here and they will be saved.
cmd
ipconfig /all
shutdown
ping
netstat
Case Folder
Element
with Audio
HTML
Try Again!
Write an email as if you were the hacker. Use all the knowledge you have and direct users to the site.
Congratulations! You solved the case.
Button
#3: Assigned task
#1: Exploit
02:0F:B5:C3:7C:C8
[x]
Command Prompt
1
Microsoft Windows [Version 10.0.18362.356]
(c) 2019 Microsoft Corporation. All right reserved.
C:\Users\mia>
2
https://ec2-52-204-154-87.compute-1.amazonaws.com
Decrypt the message and type it in the space below. Then click the submit button.
Eco qyyqvo rkmusxq dy qod dro zkccgybn pyb
cezblyi1@rydwksv.myw dy yzox dro vymuon lyh.
E
G
F
Y
H
T
Z
J
I
O
Y
D
N
A
C
Q
P
B
S
R
U
K
V
X
L
M
W
TIP #1
Click on the Case Folder to fill in the answers as you find the clues.
TIP #2
As you find clues they will be added to your Resources folder.
In the Case Folder under #3 Assigned Task, write an email as if you were the hacker. Use all the knowledge you have and direct users to the site.