Computer Forensics is all about acquiring, analyzing, and reporting on digital evidence. This evidence can be found on anything from an iPhone to a corporate server. Correctly performing these tasks requires an in-depth knowledge of how file systems work, where various operating systems hold vital data, and - most importantly - how to treat the evidence properly.
Much of the work can be done on either a Windows or a *NIX environment, but I have found that using them both is the most effective approach. As much as people may bash Windows, it does have its uses when it comes to forensics. With this in mind, I will be designating which OS to use for each challenge. This is not a requirement, but some challenges have been designed with one OS in mind. As an added bonus, you can first do the mission on the recommended OS, then try it again on the other for twice the fun!
You are going to work with a disk image of a floppy disk. To complete this challenge, you must first mount the image. If you cannot figure it out from there, you are beyond help. Remember, this is on-par with Basic 1 in terms of difficulty. (Pro tip: Do this in Linux)
When you think you have completed the challenge, you may visit this page (hosted by Bren2010) to check your answer.
Feedback is greatly appreciated. I released this challenge as a sort of beta test for the category as a whole. So if you liked it, hated it, or found some sort of bug (unlikely), I'd love to hear from you. Post your opinions in this thread.