Wednesday, November 5, 2014

Spy Hunter Holiday Challenge 2014

This holiday season I have created a network forensics challenge for the community to try and solve. This scenario, called “Spy Hunter – Operation Hermes” is the first in a new series I am going to create and publish here at My War With Entropy.

All solutions should be submitted to me at Jordan 2175 with no space at Google’s mail service no later than December 20th, 2014. Winners will be announced in January. Entries will be rated based on completeness and overall explanation of what happened and how.

Please NOTE I will NOT accept any documents in PDF or Word format.  Only plain text email and documents, something readable by pine, vim or emacs, will be accepted. By submitting a solution you grant me the right to list your name on this blog.

Good Luck.

MD5 (SpyHunter-Operation_Hermes-ver1.pdf) = 6d2bb7d0ab0d83ba2da8a1142deca758

MD5 ( = de20687a9287dcf66ddf40d699915994

Official solution information will be available to full-time faculty members teaching courses in digital forensics or cyber security at accredited academic institutions.


  1. Thanks for putting this together.

  2. Very nice, and thanks for putting this together.

  3. can anyone suggest that what time zone is used in this capture is it the local NZ time or any other time zone , please suggest, it will be much of a help

    1. The timezone should be UTC -06:00

    2. Would you be so kind to send me the answers to this? I am a faculty and would like to use this for a course with your permission

  4. can anyone please help me how to figure this out?