<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>LUKS - Tag - The handbag of Cryptax</title><link>https://cryptax.github.io/tags/luks/</link><description>LUKS - Tag - The handbag of Cryptax</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>crypto.maniak@gmail.com (Cryptax)</managingEditor><webMaster>crypto.maniak@gmail.com (Cryptax)</webMaster><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cryptax.github.io/tags/luks/" rel="self" type="application/rss+xml"/><item><title>THCon 2026 - Forensics Challenges</title><link>https://cryptax.github.io/thcon2026-breach/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/thcon2026-breach/</guid><description>Don&amp;rsquo;t forget to lock This is the first challenge of the Forensics category.
1 We seized a suspect&amp;#39;s computer and managed to capture a RAM dump before it was powered off, along with an encrypted disk. Your objective is to decrypt the drive. We get a chall.tar.gz
Solving the challenge The tar.gz contains 2 files: an ELF and a raw:
1 2 3 drwxr-xr-x aurel/aurel 0 2026-03-09 16:46 files/ -rw-r--r-- aurel/aurel 1072693248 2026-03-09 16:46 files/disk.</description></item></channel></rss>