Veruca Salt clutched an iPaq running the PocketPC operating system.
Mike Teevee carried a PalmOS-based PDA.
…and Charlie clung to his old, beaten-up Linux-based Thinkpad.
During the tour, the children noticed small, orange men operating the machinery in Wonka's factory. "What are they?" cried Veruca, in an annoying faux British accent.
"They're Oompa Loompas from
Loompaland," answered Wonka, "They perform all of my system administration, network, and security tasks. Why, I've got them monitoring IDS sensors everywhere. Any children caught hacking my systems will be
summarily dismissed and searched by my forensics Oompa Loompas!"
"Why all the security?" asked Charlie.
"It's Slugworth," whispered Wonka, "He's after the formula for my new Everlasting Gobstoppers. I
must keep it secret from him or I'm ruined!" Wonka briefly showed the children the Everlasting Gobstopper recipe on his computer browser. The file was named "Gobstopper.txt" and it contained the strings
"secret," "gobstopperXZ," and "recipe08".
The tour commenced. Sadly, at various points of the expedition, each child attacked Wonka's systems. Augustus conducted a gluttonous port scan of all systems on
the chocolate river, blocking the network pipe. Violet tried swiping an Ooompa Loompa's blackberry, turning into a giant blackberry herself. Veruca launched a buffer overflow attack, using a bad egg that was
instantly detected. Mike attempted to create a covert channel in a streaming video link. Even good-natured Charlie accidentally contaminated the controller of a ceiling fan with the SQL Slammer worm.
As the children were dismissed from the tour, they had to submit their computer or PDA to the forensics Oompa Loompas as they left the building.
And that, dear reader, is where you come in. You get to be a
forensics Oompa Loompa, and answer the following questions:
1) On each child's computer, where would you search for the Everlasting Gobstopper recipe?
2) What tools would you use for your search?
3) How would you use these tools to find the recipe?