Scenario Overview
Alex Taylor works for HackerBusters Inc. in Silicon Valley and is the lead developer for a new groundbreaking software that could revolutionize the cybersecurity industry. Alex had the source code for the new software stored on his company MacBook in his office and was preparing for the software launch party.
A couple of days before the official launch of the software, Alex discovers that the prototype and critical data of the software have been removed from MacBook. Alex brings this to the attention of his bosses, who then immediately launch a full investigation into all of Alex’s company devices.
The internal investigation from HackerBusters, Inc revealed that Alex was the victim of a sophisticated phishing attack, where access was obtained to Alex’s office under the guise of scheduled pest removal services. HackerBusters, Inc reviewed their security camera footage and determined that the unauthorized access was obtained by Jordan Blake, a previous applicant whom HackerBusters, Inc rejected.
HackerBusters, Inc contacted law enforcement, who initiated an investigation. A search warrant for Jordan Blake’s residence was obtained and incriminating evidence was located on his iMac computer. Blake provided a complete confession during his interview, essentially stating that he had stolen software from HackerBusters, Inc as revenge for a perceived slight during the interview process.
- Narrative reports from Officer Souder and HackerBusters.
- Jordan Blake’s iMac – Seized from his residence, forensic image obtained by Officer Souder.
- Alex Taylor’s MacBook – Consent collection obtained by HackerBusters, Inc’s IT staff.
Practical Examination Files
Two disk images will be used for the practical exam. Ensure the downloaded copy has a matching hash value before locking the image and proceeding to the exam.
File Name | File Size | MD5 Hash |
---|---|---|
Alex_Macbook.dmg.zip | 3.01 GB | 1a23d548947fc76c6a74bb0160448de2 |
Jordan_Blake_iMac.dmg | 37.22 GB | 6fed986a11064ca176e7fb286f102fa7 |