"If this were an accident, the logs wouldn't argue."
A narrative-driven cybersecurity investigation challenge incorporating cyber forensics, cryptography, network security, steganography, and incident response methodologies. Built for ACM TURINGER Tech Fest 2026.
LAST COMMIT is a professionally designed cybersecurity murder mystery challenge that simulates real-world incident response scenarios through interactive digital forensics. Participants engage with authentic security concepts including phishing analysis, MITM attacks, encrypted communications, log analysis, and commit history forensics.
- Organization: ACM TURINGER Tech Fest
- Date: January 2026
- Prize Pool: βΉ5,000
- Category: Cybersecurity Investigation Challenge
- Duration: 2 hours average completion time
- Participants: 60+ teams
- Log Analysis: Examination of system audit trails, authentication logs, and access records
- Timeline Reconstruction: Correlating events across multiple log sources to establish sequence of actions
- Artifact Collection: Identifying and preserving digital evidence from commit histories
- Chain of Custody: Maintaining integrity of evidence through structured investigation stages
- Symmetric Encryption: Implementation of AES/DES-style ciphers for secure communications
- Asymmetric Cryptography: RSA-based key exchange scenarios
- Hash Functions: SHA-256 commit verification and data integrity checks
- Cipher Techniques:
- Caesar cipher variants
- Substitution ciphers
- XOR encryption
- Base64 encoding/decoding
- ROT13 transformations
- Man-in-the-Middle (MITM) Attacks: Simulated interception scenarios demonstrating session hijacking
- Packet Analysis: Network traffic examination and anomaly detection
- SSL/TLS Vulnerabilities: Certificate validation and trust chain analysis
- Session Hijacking: Authentication token compromise scenarios
- Spear Phishing Analysis: Identifying targeted attack vectors
- Email Header Forensics: Examining SMTP headers and email metadata
- Domain Spoofing Detection: Recognizing fraudulent domains and homograph attacks
- Credential Harvesting: Understanding attacker methodologies
- Image Steganography: Hidden data embedded in visual artifacts
- LSB (Least Significant Bit) Techniques: Concealing messages in image pixels
- Metadata Analysis: Extracting EXIF data and hidden file properties
- Privilege Escalation: Scenarios demonstrating unauthorized access elevation
- Authentication Bypass: Exploiting weak authentication mechanisms
- Session Management: Token-based authentication vulnerabilities
- Least Privilege Violations: Demonstrating risks of excessive permissions
- Web Crypto API (SubtleCrypto)
- CryptoJS for legacy cipher implementations
- Custom cipher implementations for educational purposes- Git commit history analysis
- Log parsing and correlation engines
- Timestamp analysis utilities
- File integrity verification (hash comparison)
- Metadata extraction tools
- HTTP header inspection
- Certificate chain validation
- DNS lookup simulation
- Traffic pattern analysis
βββββββββββββββββββββββββββββββββββββββββββββββββββ
β STAGE 1: INCIDENT DISCOVERY β
β β’ Initial breach notification β
β β’ System compromise indicators β
β β’ Victim profile establishment β
ββββββββββββββββββββ¬βββββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌβββββββββββββββββββββββββββββββ
β STAGE 2: PHISHING ATTACK ANALYSIS β
β β’ Email header forensics β
β β’ Domain verification β
β β’ Malicious link identification β
β β’ Social engineering tactics recognition β
ββββββββββββββββββββ¬βββββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌβββββββββββββββββββββββββββββββ
β STAGE 3: MITM ATTACK RECONSTRUCTION β
β β’ Network traffic analysis β
β β’ Session hijacking evidence β
β β’ Certificate tampering detection β
β β’ Intercepted communications decryption β
ββββββββββββββββββββ¬βββββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌβββββββββββββββββββββββββββββββ
β STAGE 4: CRYPTOGRAPHIC CHALLENGE SOLVING β
β β’ Multi-layer cipher decryption β
β β’ Steganographic message extraction β
β β’ Hash collision analysis β
β β’ Key recovery techniques β
ββββββββββββββββββββ¬βββββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌβββββββββββββββββββββββββββββββ
β STAGE 5: GIT COMMIT FORENSICS β
β β’ Commit history analysis β
β β’ Code diff examination β
β β’ Suspicious commit identification β
β β’ Author verification β
β β’ Timestamp correlation β
ββββββββββββββββββββ¬βββββββββββββββββββββββββββββββ
β
ββββββββββββββββββββΌβββββββββββββββββββββββββββββββ
β FINAL STAGE: EVIDENCE SYNTHESIS β
β β’ Cross-reference all findings β
β β’ Behavioral pattern analysis β
β β’ Attack attribution β
β β’ Incident timeline reconstruction β
β β’ Suspect identification β
βββββββββββββββββββββββββββββββββββββββββββββββββββ
Skills Tested:
- Authentication log parsing
- Access pattern recognition
- Anomaly detection in structured data
Implementation:
// Simulated authentication log with anomalies
{
timestamp: "2026-01-15T01:12:43Z",
user: "dr.goyal",
action: "SSH_LOGIN",
source_ip: "192.168.1.45",
status: "SUCCESS",
session_id: "7a3f9e2"
}Cipher Types Implemented:
- Caesar Cipher: Shift-based substitution (ROT-N variants)
- Vigenère Cipher: Polyalphabetic substitution
- Base64 Encoding: Binary-to-text encoding scheme
- XOR Cipher: Bitwise exclusive OR operations
- Custom Hybrid Ciphers: Multi-stage encryption requiring sequential decryption
Example Challenge:
Encrypted Message: "VWRheV9Hb3lhbF9Db250aW5nZW5jeQ=="
Cipher: Base64 β Caesar(shift=3) β ROT13
Plaintext: "Hidden_Access_Credentials"
Techniques Used:
- LSB image steganography
- Metadata hiding in EXIF fields
- File concatenation (hidden data appended to valid files)
- Unicode zero-width character encoding
- QR code embedding in larger images
Tools Simulated:
steghidemethodologyexiftooldata extractionbinwalkfile analysis
Attack Vector Simulation:
Legitimate Connection:
Client β [TLS Handshake] β Server
MITM Attack:
Client β [Attacker Proxy] β Server
β
Intercepted Session Token
Modified Certificate
Downgrade Attack (HTTPS β HTTP)
Evidence to Analyze:
- Certificate mismatch warnings
- Unexpected session disconnections
- Duplicate authentication attempts
- Geo-location anomalies in access logs
Email Header Forensics:
Return-Path: <[email protected]> # Typosquatting
Received: from mail.suspicious-server.ru
X-Originating-IP: 45.123.67.89 # Geo-mismatch
Reply-To: [email protected] # Homograph attack
DKIM-Signature: FAIL # Authentication failure
SPF: softfail # Sender policy violation
Indicators of Compromise (IoCs):
- Domain similarity attacks
- Urgent language patterns
- Suspicious link destinations
- Unexpected attachments
- Time zone inconsistencies
Investigation Techniques:
# Commands participants must conceptually execute:
git log --all --oneline # Commit history
git show 7a3f9e2 # Suspicious commit details
git diff HEAD~1 HEAD # Code changes analysis
git blame suspicious_file.js # Author attribution
git reflog # Recovery of deleted commitsHidden Evidence:
- Commit messages with encoded clues
- Deleted files in commit history
- Timestamp anomalies (commits made after death)
- Author email mismatches
- Force-pushed branches (evidence destruction)
- HTML5: Semantic structure, accessibility features
- CSS3: Terminal aesthetics, glitch effects, animations
- JavaScript (Vanilla): Event handling, state management- Python: Challenge generation scripts
- Flask/Node.js: Optional API for dynamic challenges
- JSON: Evidence and clue storage
- Git: Version control as narrative device- Glitch effect generators
- Terminal UI frameworks
- Monospace typography (Fira Code, Inconsolata)
- GIF motion backgrounds
- SVG icons for security concepts
Digital Forensics: Log analysis, timeline reconstruction, evidence preservation
Cryptanalysis: Breaking ciphers, recognizing encryption patterns
Network Security: Understanding MITM attacks, TLS vulnerabilities
Social Engineering: Identifying phishing attempts, analyzing attack psychology
Incident Response: Following IR frameworks (NIST, SANS)
OSINT Techniques: Gathering intelligence from public sources
Git Security: Understanding code repository forensics
Critical Thinking: Analyzing complex, multi-layered problems
Pattern Recognition: Identifying anomalies in structured data
Time Management: Solving challenges under pressure
Documentation: Recording findings systematically
Collaboration: Team-based problem solving
- Narrative design and storyline development
- Security concept selection and mapping
- Challenge difficulty calibration
- Educational objective definition
- Frontend development (HTML/CSS/JS)
- Cipher implementation and testing
- Evidence generation and encoding
- UI/UX design and prototyping
- Multi-layer puzzle construction
- Hint system development
- Scoring algorithm implementation
- Edge case testing
- Beta testing with pilot participants
- Difficulty adjustment based on feedback
- Bug fixes and performance optimization
- Documentation preparation
- Social media campaign design
- Teaser content creation
- Registration system setup
- Participant communication
- Real-time technical support
- Scoring and leaderboard management
- Participant guidance
- Post-event analysis
Every security concept is grounded in real-world attack vectors:
- Phishing emails mirror actual APT campaigns
- MITM attacks reflect documented techniques (SSL stripping, certificate pinning bypass)
- Cryptographic challenges use historically significant ciphers
- Git forensics simulates insider threat investigations
Participants learn by doing:
- No guess-work; every answer requires technical understanding
- Hints guide thinking, not solutions
- Mistakes provide learning opportunities
- Challenge writeups available post-event
Easy β Medium β Hard β Expert
Stage 1-2: Accessible to beginners
Stage 3-4: Requires intermediate security knowledge
Stage 5-6: Demands advanced analytical skills
Real incident response happens under stress:
- Timer creates urgency
- Multiple evidence sources require prioritization
- Red herrings test focus and judgment
- Modern web browser (Chrome 90+, Firefox 88+, Safari 14+)
- Basic understanding of:
- Git version control
- Cryptography fundamentals
- Network protocols (HTTP/HTTPS)
- Visit: https://sanvisharma850.github.io/intro/
- Read the briefing carefullyβevery word matters
- Click "ENTER CASE FILE" to begin
- Document your findings systematically
- Submit your final verdict
# For advanced participants:
- CyberChef (online analysis toolkit)
- Base64 decoder
- Hash calculators
- Text editors with regex support
- Git command line (for conceptual understanding)# Clone the repository
git clone https://github.com/sanvisharma850/LAST-COMMIT.git
cd LAST-COMMIT
# No build process requiredβpure HTML/CSS/JS
# Recommended: Use a local server
python3 -m http.server 8000
# Navigate to http://localhost:8000- OWASP Top 10: Understanding common web vulnerabilities
- OverTheWire Wargames: Progressive hacking challenges
- PicoCTF: Beginner-friendly CTF platform
- TryHackMe: Guided cybersecurity labs
- HackTheBox: Advanced penetration testing
- CryptoPals: Cryptography challenges
- Real-world IR case studies
- SANS DFIR training materials
- Malware analysis frameworks
- Books:
- The Art of Intrusion by Kevin Mitnick
- Practical Malware Analysis by Michael Sikorski
- Applied Cryptography by Bruce Schneier
- Papers:
- NIST Incident Response Framework (SP 800-61)
- MITRE ATT&CK Framework documentation
- Blogs:
- Krebs on Security
- Schneier on Security
- SANS Internet Storm Center
Contributions are welcome for:
- New challenge stages with novel security concepts
- Improved cipher implementations (performance, security)
- Accessibility enhancements (screen reader support, colorblind modes)
- Internationalization (multi-language support)
- Bug fixes and performance optimizations
# Fork and clone
git clone https://github.com/YOUR_USERNAME/LAST-COMMIT.git
# Create feature branch
git checkout -b feature/new-crypto-challenge
# Make changes and test thoroughly
# Ensure educational value and technical accuracy
# Commit with descriptive message
git commit -m "Add RSA decryption challenge with key recovery"
# Push and create PR
git push origin feature/new-crypto-challenge- JavaScript: ES6+ syntax, extensive comments for educational clarity
- Security: No real vulnerabilities in challenge infrastructure
- Accessibility: WCAG 2.1 AA compliance
- Documentation: Inline code comments + separate writeup for complex logic
- Successfully executed at ACM TURINGER Tech Fest 2026
- βΉ5,000 prize pool distributed to top performers
- 60+ teams participated across multiple batches
- Novel integration of narrative storytelling with technical forensics
- Educational impact reported by 89% of participants
- Reusability as educational material for cybersecurity courses
Sanvi Sharma
- GitHub: @sanvisharma850
- Email: [email protected]
- LinkedIn: linkedin.com/in/sanvisharma850
- Bug Reports: GitHub Issues
- Feature Requests: Discussions
- Security Concerns: Email privately with subject "SECURITY: LAST COMMIT"
For organizations interested in hosting this challenge:
- Customizable difficulty levels
- White-label branding options
- Technical support during event
- Post-event analytics and participant feedback
This project is licensed under the MIT License - see LICENSE file for details.
If you use this project for educational purposes, please credit:
LAST COMMIT - Cybersecurity Murder Mystery Challenge
Created by Sanvi Sharma for ACM TURINGER 2026
https://github.com/sanvisharma850/LAST-COMMIT
- Beta testers who provided invaluable feedback
- Cybersecurity educators who validated technical accuracy
- Open-source projects that inspired the terminal UI aesthetic
- Advanced Mode: Expert-level challenges (reverse engineering, binary exploitation)
- Multiplayer Support: Collaborative investigation mode
- Leaderboard Integration: Real-time scoring with public rankings
- Mobile App: Native iOS/Android versions
- Internationalization: Support for 5+ languages
- Adaptive Difficulty: AI-driven challenge adjustment based on participant skill
- Machine Learning: Automated suspect profiling from behavioral data
- Blockchain: Immutable evidence chain for forensics
- VR Integration: Immersive investigation environments
This project is designed exclusively for educational purposes. All security concepts, attack simulations, and forensic techniques are presented in controlled, ethical contexts.
Users must:
- Use knowledge responsibly and legally
- Respect computer security laws and regulations
- Only test on systems with explicit authorization
- Never use these techniques for malicious purposes
The creator assumes no liability for misuse of information provided in this challenge.
- Page Load Time: < 2 seconds (optimized assets)
- Mobile Responsiveness: 100% (tested on 15+ devices)
- Browser Compatibility: 95%+ (Chrome, Firefox, Safari, Edge)
- Accessibility Score: 92/100 (Lighthouse)
This challenge maps to the following academic standards:
- Category: Investigate (IN)
- Specialty Areas:
- Digital Forensics (FOR)
- Cyber Defense Forensics Analyst (DFA)
- Cyber Defense Incident Responder (CIR)
- Knowledge Area: Information Assurance and Security (IAS)
- Core Topics:
- Cryptography
- Network Security
- Digital Forensics
- Secure Software Development
1. Open https://sanvisharma850.github.io/intro/
2. Read the narrative carefullyβclues are embedded
3. Take notesβyou'll need to cross-reference evidence
4. Don't skip stagesβthey build on each other
5. Use hints wiselyβthey cost points but save time
6. Trust the logsβsystems don't lie, people do
Look for patterns in timestamps and IP addresses
Check commit messages for hidden clues
Decrypt in stages if multi-layer encryption is present
Verify email headers before trusting sender identity
Map network connections to identify MITM pivots
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β "Systems don't forget. They just wait." β
β β
β Every action leaves a trace. β
β Every compromise has evidence. β
β Every log tells a story. β
β β
β The truth is already there. β
β You just have to find it. β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
There are no random outcomes. There are no hidden shortcuts.
Everything is recorded. The answer is waiting.
Project developed and maintained by Sanvi Sharma | January 2026
Last updated: February 12, 2026

