<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Shirley Mali</title>
    <description>The latest articles on Forem by Shirley Mali (@shirmali).</description>
    <link>https://forem.com/shirmali</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3301204%2F0e9a175a-d5e4-4b14-8c62-3ad8f75772a2.jpeg</url>
      <title>Forem: Shirley Mali</title>
      <link>https://forem.com/shirmali</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/shirmali"/>
    <language>en</language>
    <item>
      <title>Symmetric vs Asymmetric Encryption — Lessons from the Field</title>
      <dc:creator>Shirley Mali</dc:creator>
      <pubDate>Mon, 28 Jul 2025 20:54:50 +0000</pubDate>
      <link>https://forem.com/shirmali/symmetric-vs-asymmetric-encryption-lessons-from-the-field-5kd</link>
      <guid>https://forem.com/shirmali/symmetric-vs-asymmetric-encryption-lessons-from-the-field-5kd</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;One of the trickiest questions in my Security+ exam wasn’t about tools or firewalls — it was about &lt;strong&gt;cryptography&lt;/strong&gt;. And honestly? It caught me off guard.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Let’s talk about two foundational pillars of encryption: &lt;strong&gt;symmetric&lt;/strong&gt; and &lt;strong&gt;asymmetric&lt;/strong&gt; cryptography — and why understanding them matters &lt;em&gt;far beyond exams&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔁 Symmetric Encryption: The One-Key Wonder
&lt;/h2&gt;

&lt;p&gt;Symmetric encryption uses &lt;strong&gt;a single key&lt;/strong&gt; to both encrypt and decrypt data.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧠 How It Works:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Sender encrypts the message using a shared key.&lt;/li&gt;
&lt;li&gt;Receiver uses the same key to decrypt it.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Think of it like a house key — both people need an identical copy to get in.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  ✅ Use Cases:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Encrypting stored data (e.g., full-disk encryption)&lt;/li&gt;
&lt;li&gt;VPN tunnels (often use AES)&lt;/li&gt;
&lt;li&gt;Secure backups&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Common Algorithms:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;AES (Advanced Encryption Standard)&lt;/li&gt;
&lt;li&gt;DES (Data Encryption Standard)&lt;/li&gt;
&lt;li&gt;Blowfish&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  ⚠️ Downsides:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;You need to &lt;strong&gt;securely share the key&lt;/strong&gt; beforehand.&lt;/li&gt;
&lt;li&gt;If someone intercepts the key, game over.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔐 Asymmetric Encryption: The Key Pair Dance
&lt;/h2&gt;

&lt;p&gt;Asymmetric encryption uses &lt;strong&gt;two keys&lt;/strong&gt; — a &lt;strong&gt;public key&lt;/strong&gt; for encryption and a &lt;strong&gt;private key&lt;/strong&gt; for decryption.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧠 How It Works:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Sender encrypts data using recipient’s &lt;strong&gt;public key&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Only the &lt;strong&gt;private key&lt;/strong&gt; can decrypt it.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Think of it like a mailbox — anyone can drop in a message (public key), but only the owner can unlock it (private key).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  ✅ Use Cases:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Secure email (e.g., PGP, GPG)&lt;/li&gt;
&lt;li&gt;Digital signatures&lt;/li&gt;
&lt;li&gt;TLS/SSL handshakes&lt;/li&gt;
&lt;li&gt;SSH authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Common Algorithms:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;RSA&lt;/li&gt;
&lt;li&gt;ECC (Elliptic Curve Cryptography)&lt;/li&gt;
&lt;li&gt;DSA&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  ⚠️ Downsides:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Slower than symmetric encryption&lt;/li&gt;
&lt;li&gt;More computational overhead&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧪 A Real-World Scenario: Ransomware Simulation
&lt;/h2&gt;

&lt;p&gt;During a lab project simulating a ransomware attack, I used &lt;strong&gt;symmetric AES&lt;/strong&gt; to encrypt a victim's files — fast and brutal.&lt;/p&gt;

&lt;p&gt;But to safely share the &lt;strong&gt;decryption key&lt;/strong&gt; with the "SOC team," I wrapped it in &lt;strong&gt;RSA public key encryption&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;Hybrid encryption&lt;/strong&gt; is common:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Symmetric key encrypts the data (fast)&lt;/li&gt;
&lt;li&gt;Asymmetric key encrypts the symmetric key (secure)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔏 Bonus: Digital Signatures
&lt;/h2&gt;

&lt;p&gt;Another brilliant application of asymmetric crypto is &lt;strong&gt;digital signatures&lt;/strong&gt;. Here’s how:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;You &lt;strong&gt;hash&lt;/strong&gt; the message.&lt;/li&gt;
&lt;li&gt;You &lt;strong&gt;sign&lt;/strong&gt; the hash using your private key.&lt;/li&gt;
&lt;li&gt;The recipient uses your &lt;strong&gt;public key&lt;/strong&gt; to verify the signature.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;✅ Ensures &lt;strong&gt;authenticity&lt;/strong&gt;, &lt;strong&gt;integrity&lt;/strong&gt;, and &lt;strong&gt;non-repudiation&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡️ Lessons for Every Cybersecurity Learner
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Encryption isn’t just “security fluff” — it’s math that &lt;strong&gt;protects people and systems&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;You don’t have to be a cryptographer to understand how to apply it effectively.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Think like an attacker&lt;/strong&gt;: If you don’t know how your crypto works, they will.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🗨️ What About You?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Have you used encryption in your own projects?&lt;/li&gt;
&lt;li&gt;Got tripped up by crypto concepts during an exam or job interview?&lt;/li&gt;
&lt;li&gt;Curious how to use asymmetric keys in tools like GPG or OpenSSL?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s chat below 💬 or connect on &lt;a href="https://www.linkedin.com" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;!&lt;/p&gt;




&lt;h3&gt;
  
  
  🧠 Want to Learn More?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cryptotools.net/rsakeygen" rel="noopener noreferrer"&gt;RSA Interactive Tool (Visual)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gchq.github.io/CyberChef/" rel="noopener noreferrer"&gt;CyberChef — All-in-one crypto playground&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://tools.kali.org/" rel="noopener noreferrer"&gt;Kali Linux Hashing &amp;amp; Encryption Tools&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;📌 &lt;em&gt;I’m currently exploring SOC analyst workflows and building cyber labs for practice. If you're doing something similar or hiring — let’s talk!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;`&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>encryption</category>
      <category>cryptography</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Symmetric vs Asymmetric Encryption — Lessons from the Field</title>
      <dc:creator>Shirley Mali</dc:creator>
      <pubDate>Mon, 28 Jul 2025 20:54:50 +0000</pubDate>
      <link>https://forem.com/shirmali/symmetric-vs-asymmetric-encryption-lessons-from-the-field-4bkk</link>
      <guid>https://forem.com/shirmali/symmetric-vs-asymmetric-encryption-lessons-from-the-field-4bkk</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;One of the trickiest questions in my Security+ exam wasn’t about tools or firewalls — it was about &lt;strong&gt;cryptography&lt;/strong&gt;. And honestly? It caught me off guard.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Let’s talk about two foundational pillars of encryption: &lt;strong&gt;symmetric&lt;/strong&gt; and &lt;strong&gt;asymmetric&lt;/strong&gt; cryptography — and why understanding them matters &lt;em&gt;far beyond exams&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔁 Symmetric Encryption: The One-Key Wonder
&lt;/h2&gt;

&lt;p&gt;Symmetric encryption uses &lt;strong&gt;a single key&lt;/strong&gt; to both encrypt and decrypt data.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧠 How It Works:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Sender encrypts the message using a shared key.&lt;/li&gt;
&lt;li&gt;Receiver uses the same key to decrypt it.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Think of it like a house key — both people need an identical copy to get in.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  ✅ Use Cases:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Encrypting stored data (e.g., full-disk encryption)&lt;/li&gt;
&lt;li&gt;VPN tunnels (often use AES)&lt;/li&gt;
&lt;li&gt;Secure backups&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Common Algorithms:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;AES (Advanced Encryption Standard)&lt;/li&gt;
&lt;li&gt;DES (Data Encryption Standard)&lt;/li&gt;
&lt;li&gt;Blowfish&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  ⚠️ Downsides:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;You need to &lt;strong&gt;securely share the key&lt;/strong&gt; beforehand.&lt;/li&gt;
&lt;li&gt;If someone intercepts the key, game over.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔐 Asymmetric Encryption: The Key Pair Dance
&lt;/h2&gt;

&lt;p&gt;Asymmetric encryption uses &lt;strong&gt;two keys&lt;/strong&gt; — a &lt;strong&gt;public key&lt;/strong&gt; for encryption and a &lt;strong&gt;private key&lt;/strong&gt; for decryption.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧠 How It Works:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Sender encrypts data using recipient’s &lt;strong&gt;public key&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Only the &lt;strong&gt;private key&lt;/strong&gt; can decrypt it.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Think of it like a mailbox — anyone can drop in a message (public key), but only the owner can unlock it (private key).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  ✅ Use Cases:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Secure email (e.g., PGP, GPG)&lt;/li&gt;
&lt;li&gt;Digital signatures&lt;/li&gt;
&lt;li&gt;TLS/SSL handshakes&lt;/li&gt;
&lt;li&gt;SSH authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Common Algorithms:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;RSA&lt;/li&gt;
&lt;li&gt;ECC (Elliptic Curve Cryptography)&lt;/li&gt;
&lt;li&gt;DSA&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  ⚠️ Downsides:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Slower than symmetric encryption&lt;/li&gt;
&lt;li&gt;More computational overhead&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧪 A Real-World Scenario: Ransomware Simulation
&lt;/h2&gt;

&lt;p&gt;During a lab project simulating a ransomware attack, I used &lt;strong&gt;symmetric AES&lt;/strong&gt; to encrypt a victim's files — fast and brutal.&lt;/p&gt;

&lt;p&gt;But to safely share the &lt;strong&gt;decryption key&lt;/strong&gt; with the "SOC team," I wrapped it in &lt;strong&gt;RSA public key encryption&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;Hybrid encryption&lt;/strong&gt; is common:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Symmetric key encrypts the data (fast)&lt;/li&gt;
&lt;li&gt;Asymmetric key encrypts the symmetric key (secure)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔏 Bonus: Digital Signatures
&lt;/h2&gt;

&lt;p&gt;Another brilliant application of asymmetric crypto is &lt;strong&gt;digital signatures&lt;/strong&gt;. Here’s how:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;You &lt;strong&gt;hash&lt;/strong&gt; the message.&lt;/li&gt;
&lt;li&gt;You &lt;strong&gt;sign&lt;/strong&gt; the hash using your private key.&lt;/li&gt;
&lt;li&gt;The recipient uses your &lt;strong&gt;public key&lt;/strong&gt; to verify the signature.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;✅ Ensures &lt;strong&gt;authenticity&lt;/strong&gt;, &lt;strong&gt;integrity&lt;/strong&gt;, and &lt;strong&gt;non-repudiation&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡️ Lessons for Every Cybersecurity Learner
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Encryption isn’t just “security fluff” — it’s math that &lt;strong&gt;protects people and systems&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;You don’t have to be a cryptographer to understand how to apply it effectively.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Think like an attacker&lt;/strong&gt;: If you don’t know how your crypto works, they will.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🗨️ What About You?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Have you used encryption in your own projects?&lt;/li&gt;
&lt;li&gt;Got tripped up by crypto concepts during an exam or job interview?&lt;/li&gt;
&lt;li&gt;Curious how to use asymmetric keys in tools like GPG or OpenSSL?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s chat below 💬 or connect on &lt;a href="https://www.linkedin.com" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;!&lt;/p&gt;




&lt;h3&gt;
  
  
  🧠 Want to Learn More?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cryptotools.net/rsakeygen" rel="noopener noreferrer"&gt;RSA Interactive Tool (Visual)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gchq.github.io/CyberChef/" rel="noopener noreferrer"&gt;CyberChef — All-in-one crypto playground&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://tools.kali.org/" rel="noopener noreferrer"&gt;Kali Linux Hashing &amp;amp; Encryption Tools&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;📌 &lt;em&gt;I’m currently exploring SOC analyst workflows and building cyber labs for practice. If you're doing something similar or hiring — let’s talk!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;`&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>encryption</category>
      <category>cryptography</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Recovering a Flag from an RDP Cache</title>
      <dc:creator>Shirley Mali</dc:creator>
      <pubDate>Wed, 09 Jul 2025 14:47:37 +0000</pubDate>
      <link>https://forem.com/shirmali/recovering-a-flag-from-an-rdp-cache-5dfl</link>
      <guid>https://forem.com/shirmali/recovering-a-flag-from-an-rdp-cache-5dfl</guid>
      <description>&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: Learn how I solved the Job Interview challenge on Root-Me by converting an EnCase image, detecting hidden archives, and uncovering sensitive RDP cache screenshots using open-source tools.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 &lt;strong&gt;Root-Me Forensics Challenge: Job Interview&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The “Job Interview” challenge from &lt;a href="https://www.root-me.org/en/Challenges/Forensic/Job-interview" rel="noopener noreferrer"&gt;Root-Me's Forensic section&lt;/a&gt; is an exciting test of your ability to work with forensic images and uncover hidden artifacts.&lt;/p&gt;

&lt;p&gt;In this walkthrough, I’ll show how I:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Extracted a hidden archive from a forensic &lt;code&gt;.E01&lt;/code&gt; image
&lt;/li&gt;
&lt;li&gt;Identified and unpacked an RDP bitmap cache
&lt;/li&gt;
&lt;li&gt;Analyzed screenshots for sensitive information
&lt;/li&gt;
&lt;li&gt;Ultimately recovered the &lt;strong&gt;flag&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧰 Tools I Used
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Use Case&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;ewfexport&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Convert EnCase &lt;code&gt;.E01&lt;/code&gt; image to &lt;code&gt;.raw&lt;/code&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;code&gt;file&lt;/code&gt;, &lt;code&gt;tar&lt;/code&gt;
&lt;/td&gt;
&lt;td&gt;Identify file types and extract archives&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;bmc-tools&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Decode &lt;code&gt;.bmc&lt;/code&gt; RDP bitmap cache&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;eog&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;View extracted &lt;code&gt;.bmp&lt;/code&gt; screenshots&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;code&gt;binwalk&lt;/code&gt; (optional)&lt;/td&gt;
&lt;td&gt;Analyze file internals for signatures&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;p&gt;🪪 &lt;strong&gt;Step 1: Convert &lt;code&gt;.E01&lt;/code&gt; to &lt;code&gt;.raw&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The challenge provides an EnCase image file: &lt;code&gt;image_forensic.e01&lt;/code&gt;. This needs to be converted into a raw binary format.&lt;/p&gt;

&lt;p&gt;Use the following command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ewfexport image_forensic
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When prompted, input the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Export format: raw&lt;/li&gt;
&lt;li&gt;Target path and filename: image&lt;/li&gt;
&lt;li&gt;Segment size: (just press Enter for default)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This will generate:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;image.raw 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;⚠️ Don't add the .e01 again — the tool detects it automatically.&lt;/p&gt;




&lt;p&gt;🔍 &lt;strong&gt;Step 2: Investigate the File Type&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now, don’t just assume that image.raw is a true raw disk image. Use the file command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;file image.raw
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;image.raw: POSIX &lt;span class="nb"&gt;tar &lt;/span&gt;archive &lt;span class="o"&gt;(&lt;/span&gt;GNU&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;🎯 &lt;strong&gt;It’s not a disk image — it’s a .tar archive disguised with a .raw extension.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;📦 &lt;strong&gt;Step 3: Extract the Archive&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Unpack the tar file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;tar&lt;/span&gt; &lt;span class="nt"&gt;-xvf&lt;/span&gt; image.raw
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This extracts:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;bcache24.bmc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;p&gt;🧠 &lt;strong&gt;Step 4: What Is a .bmc File?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;.bmc files are bitmap cache files used by Windows Remote Desktop Protocol (RDP).&lt;/p&gt;

&lt;p&gt;These files contain screen fragments cached during an RDP session. They can reveal:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Screenshots of documents&lt;/li&gt;
&lt;li&gt;Passwords or flags displayed&lt;/li&gt;
&lt;li&gt;Session activity logs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Since this format is not natively supported, we’ll use an open-source Python tool called bmc-tools.&lt;/p&gt;




&lt;p&gt;🛠️ &lt;strong&gt;Step 5: Extract .bmp Screenshots Using bmc-tools&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  5.1 Clone the Repository
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/ANSSI-FR/bmc-tools.git
&lt;span class="nb"&gt;cd &lt;/span&gt;bmc-tools
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  5.2 Create Output Directory
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;mkdir&lt;/span&gt; ../bcache24bmc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  5.3 Run the Tool
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;./bmc-tools.py &lt;span class="nt"&gt;-s&lt;/span&gt; ../bcache24.bmc &lt;span class="nt"&gt;-d&lt;/span&gt; ../bcache24bmc/ &lt;span class="nt"&gt;-v&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;-s:Source .bmc file&lt;/li&gt;
&lt;li&gt;-d: Output directory for .bmp files&lt;/li&gt;
&lt;li&gt;-v: Verbose mode&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This creates .bmp images in the output folder.&lt;/p&gt;




&lt;p&gt;🖼️ &lt;strong&gt;Step 6: Review the Extracted Screenshots&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To browse the extracted screenshots:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;eog ../bcache24bmc/&lt;span class="k"&gt;*&lt;/span&gt;.bmp
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Manually inspecting the images reveals three screenshots:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;- Yeah (RdP&lt;/em&gt;)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;this is the (l3av3s_Tra)&lt;/li&gt;
&lt;li&gt;flag (c3s)_&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🏁 &lt;strong&gt;Final Flag&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;RdP_l3av3s_Trac3S
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;🎉 &lt;strong&gt;This is the flag displayed in three of the RDP session screenshots!&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 Forensic Takeaways
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Always use file to verify content types&lt;/li&gt;
&lt;li&gt;Don't trust extensions — .raw can be .tar&lt;/li&gt;
&lt;li&gt;RDP .bmc files can leak visual data from remote sessions&lt;/li&gt;
&lt;li&gt;Screenshots are evidence, even if they’re fragments&lt;/li&gt;
&lt;li&gt;Open-source tools like bmc-tools are vital in DFIR work&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;📋 &lt;strong&gt;Summary of Commands&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1: Convert E01 to raw
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ewfexport image_forensic
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Step 2: Inspect the file type
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;file image.raw
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Step 3: Extract tar archive
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;tar&lt;/span&gt; &lt;span class="nt"&gt;-xvf&lt;/span&gt; image.raw
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Step 4: Clone BMC tools and set up
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/ANSSI-FR/bmc-tools.git
&lt;span class="nb"&gt;cd &lt;/span&gt;bmc-tools
&lt;span class="nb"&gt;mkdir&lt;/span&gt; ../bcache24bmc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Step 5: Decode bitmap cache
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;./bmc-tools.py &lt;span class="nt"&gt;-s&lt;/span&gt; ../bcache24.bmc &lt;span class="nt"&gt;-d&lt;/span&gt; ../bcache24bmc/ &lt;span class="nt"&gt;-v&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Step 6: View extracted images
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;eog ../bcache24bmc/&lt;span class="k"&gt;*&lt;/span&gt;.bmp
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;🙌 &lt;strong&gt;Let’s Connect&lt;/strong&gt;&lt;br&gt;
If this write-up helped or inspired you:&lt;/p&gt;

&lt;p&gt;💻 &lt;a href="https://github.com/Shirmali/Uncover-Hidden-Evidence/blob/main/README.md" rel="noopener noreferrer"&gt;GitHub:&lt;/a&gt;&lt;br&gt;
🔗 &lt;a href="https://www.linkedin.com/in/shirley-mali-a5449019b/" rel="noopener noreferrer"&gt;LinkedIn:&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;✍️ Follow me on Dev.to for more CTF and DFIR content&lt;/p&gt;

&lt;p&gt;Thanks for reading — and happy hunting! 🧩🕵️‍♀️&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>forensics</category>
      <category>ctf</category>
      <category>digitalforensics</category>
    </item>
    <item>
      <title>🕵🏽‍♀️ Uncovering the Unseen: My Digital Forensics Journey with Deleted File Recovery</title>
      <dc:creator>Shirley Mali</dc:creator>
      <pubDate>Tue, 08 Jul 2025 11:48:02 +0000</pubDate>
      <link>https://forem.com/shirmali/uncovering-the-unseen-my-digital-forensics-journey-with-deleted-file-recovery-50j5</link>
      <guid>https://forem.com/shirmali/uncovering-the-unseen-my-digital-forensics-journey-with-deleted-file-recovery-50j5</guid>
      <description>&lt;p&gt;🌐&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the ever-evolving world of cybersecurity, one truth stands strong: attackers will try to hide their tracks — often by deleting files, logs, or data traces.&lt;/p&gt;

&lt;p&gt;But deletion doesn’t mean destruction.&lt;/p&gt;

&lt;p&gt;That's where digital forensics steps in. And in my latest project, I dove headfirst into a hands-on recovery scenario that challenged me to retrieve deleted files from a compressed archive. The result? A deeper appreciation — and, frankly, an obsession — with the art of uncovering what isn't meant to be found.&lt;/p&gt;

&lt;p&gt;This post walks you through the full process, tools used, the learning outcomes, and why this kind of project is so critical in modern cybersecurity.&lt;/p&gt;




&lt;p&gt;🚀 &lt;strong&gt;Background: From Burnout to Obsession&lt;/strong&gt;&lt;br&gt;
Since March 2025, I took a break from being active to focus on two big things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🧠 Studying for the CompTIA CySA+ certification&lt;/li&gt;
&lt;li&gt;🛌 Recovering from a bout of sickness that forced me to slow down&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That downtime turned into something powerful: I began immersing myself in digital forensics — and this project marks the beginning of my practical journey.&lt;/p&gt;



&lt;p&gt;💼 &lt;strong&gt;The Challenge: Recovering a Deleted File&lt;/strong&gt;&lt;br&gt;
The project was inspired by a Root Me forensics challenge, where you're given a .gz file — and that's it.&lt;/p&gt;

&lt;p&gt;The objective?&lt;br&gt;
➡️ &lt;strong&gt;Recover a deleted file that was hidden inside.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sounds simple?&lt;/p&gt;

&lt;p&gt;Not when you realize:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The original file was compressed&lt;/li&gt;
&lt;li&gt;Then renamed&lt;/li&gt;
&lt;li&gt;And the actual content inside had been deleted&lt;/li&gt;
&lt;li&gt;You don’t know the file type, structure, or extension&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This challenge forced me to think like a forensic investigator: follow the breadcrumbs, verify every assumption, and carve through digital noise.&lt;/p&gt;



&lt;p&gt;🧰 &lt;strong&gt;Tools Used&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Purpose&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;gunzip&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Decompress the &lt;code&gt;.gz&lt;/code&gt; archive&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;mv&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Rename and prepare the archive for extraction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;tar&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Extract archived files&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Identify file types&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Foremost&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;File carving: recover deleted files based on known signatures&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;



&lt;p&gt;🛠️ &lt;strong&gt;Step-by-Step Walkthrough&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1️⃣ &lt;strong&gt;Decompress the .gz Archive&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;gunzip &lt;/span&gt;ch39.gz
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This gave me a single file named ch39, with no extension. That hinted it might be a tarball — just renamed.&lt;/p&gt;

&lt;p&gt;2️⃣ &lt;strong&gt;Rename and Extract the Archive&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;mv &lt;/span&gt;ch39 ch39.tar
&lt;span class="nb"&gt;tar&lt;/span&gt; &lt;span class="nt"&gt;-xvf&lt;/span&gt; ch39.tar
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This revealed a single suspicious file.  I ran file on it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;file usb.image
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;But even this didn’t give me clarity. That’s when I turned to &lt;strong&gt;Foremost&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;3️⃣ &lt;strong&gt;File Carving with Foremost&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Foremost is a digital forensics tool that searches raw data for file headers and footers to reconstruct files — even if they’re “deleted.”&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;foremost &lt;span class="nt"&gt;-i&lt;/span&gt; usb.image &lt;span class="nt"&gt;-o&lt;/span&gt; output/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This carved out audit.txt &amp;amp; png. I then opened each recovered file, cross-checked the structure and content, and finally uncovered the flagged file — the one that had been deliberately deleted and hidden.&lt;/p&gt;




&lt;p&gt;💡 &lt;strong&gt;Lessons Learned&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;File carving&lt;/strong&gt; is essential when metadata is gone or tampered with.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Command-line forensics&lt;/strong&gt; is powerful and foundational for incident response.&lt;/li&gt;
&lt;li&gt;Even simple challenges can simulate real-world attacker behavior (e.g., renaming, compressing, deleting).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Foremost&lt;/strong&gt; is a must-know tool for any digital forensics beginner.&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;_Why Digital Forensics Matters Now More Than Ever&lt;/p&gt;

&lt;p&gt;With advanced attackers and insider threats rising, digital forensics plays a critical role in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🔓 Incident response&lt;/li&gt;
&lt;li&gt;📁 Legal &amp;amp; compliance investigations&lt;/li&gt;
&lt;li&gt;🔍 Threat hunting&lt;/li&gt;
&lt;li&gt;🔄 Root cause analysis&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The ability to &lt;strong&gt;recover deleted or obfuscated files&lt;/strong&gt; often makes the difference between knowing how a breach occurred — or staying in the dark.&lt;/p&gt;




&lt;p&gt;💙 &lt;strong&gt;My Growing Obsession&lt;/strong&gt;&lt;br&gt;
This project reminded me that digital forensics is more than a skill — it's a mindset.&lt;/p&gt;

&lt;p&gt;🕵🏽‍♀️ It’s about thinking like an investigator.&lt;br&gt;
🧠 It’s about asking “what’s missing?”&lt;br&gt;
🧩 It’s about piecing together broken data until the story becomes clear.&lt;/p&gt;

&lt;p&gt;As someone pursuing a career in &lt;strong&gt;blue teaming&lt;/strong&gt; and &lt;strong&gt;security operations&lt;/strong&gt;, this project confirmed that forensics is where my passion lies — and where I’m investing even more time going forward.&lt;/p&gt;




&lt;p&gt;📂 &lt;strong&gt;Full Project on GitHub&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can find the complete project (with detailed bash commands, recovery steps, and file carving output) here:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://github.com/Shirmali/Deleted-File-Recovery/blob/main/README.md" rel="noopener noreferrer"&gt;Deleted File Recovery GitHub Repo&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;🗣️ &lt;strong&gt;Let’s Connect&lt;/strong&gt;&lt;br&gt;
If you’re:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Exploring cybersecurity&lt;/li&gt;
&lt;li&gt;Studying for CySA+ or Security+&lt;/li&gt;
&lt;li&gt;Interested in digital forensics and incident response&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;…then let’s connect here on Dev.to, or on &lt;a href="https://www.linkedin.com/in/shirley-mali-a5449019b/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;. I’d love to exchange insights and support each other’s growth.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
