Exploring Project Helix: A Dive into Blue Team Forensics
Uncover the methodology behind Project Helix, a CTF that challenges blue team forensic skills, with insights on tools like Cape and MFT analysis.
Written by AI. Ibrahim Saleh
March 21, 2026

Photo: The Cyber Mentor / YouTube
In the ever-evolving landscape of cybersecurity, Capture the Flag (CTF) challenges have become a proving ground for both aspiring and seasoned professionals. The recent Project Helix CTF, hosted by TCM Security, is a testament to the complexity and excitement of these exercises, especially for blue teamers focused on digital forensics and incident response.
The Cyber Mentor, Andrew Prince, takes us on a journey through this intricate challenge, where participants were tasked with recovering deleted notes from a scientist's workstation. This walkthrough not only highlights the tools and methodologies employed but also underscores the multifaceted nature of forensic investigations.
The Challenge Setup
Drawing inspiration from the fictional world of "Plurabis," Project Helix immerses participants into a scenario involving Dr. Owens, a scientist who has mysteriously vanished after claiming to intercept a biological broadcast. The task? Recover his encrypted research notes, which he cleverly deleted, to unlock an encrypted specimen archive.
The challenge sets the stage for a hands-on exploration of forensic triage imaging using the Cape tool. As Prince explains, "Cape stands for the Cruel Artifact Parser and Extractor, a powerful tool for incident response and digital forensics." With Cape, participants can quickly acquire the necessary files and artifacts to begin their investigation.
Tools of the Trade
Cape isn't the only tool in the spotlight. The Master File Table (MFT) plays a crucial role in this challenge. The MFT is akin to the table of contents of the NTFS file system, documenting every file and directory. "When a file is deleted, its MFT entry is marked as free, but the data isn't immediately wiped," Prince notes, highlighting the opportunity for recovery before data is overwritten.
Participants are encouraged to utilize tools like MFTTE CMD for parsing the MFT and uncovering the remnants of Dr. Owens' deleted notes. The process involves filtering through thousands of records to identify files marked as unallocated.
The Intricacies of Digital Forensics
Project Helix is more than just a test of technical prowess; it's a deep dive into the nuances of digital forensics. One intriguing aspect is the exploration of alternate data streams (ADS), which provide metadata about file origins. Prince points out, "A file downloaded from the internet will often have a zone.identifier alternate data stream, revealing its web origin."
Such layers of complexity are what make digital forensics a fascinating field. Each artifact, no matter how small, can be a crucial piece of the puzzle. The challenge also encourages participants to experiment with different tools and methodologies, whether on Windows or Linux systems, fostering a spirit of innovation and problem-solving.
Beyond the Challenge
Project Helix is a reminder of the continuous learning journey in cybersecurity. As Prince concludes the walkthrough, he leaves participants with a thought-provoking question: How can we adapt these forensic techniques to real-world scenarios?
For those who missed the event, fear not—TCM Security promises more CTFs in the future, each offering a unique opportunity to hone your skills and stay ahead in the world of digital forensics and incident response.
In the end, the real win in challenges like Project Helix isn't just capturing the flag—it's the insights gained and the curiosity sparked along the way.
By Ibrahim Saleh
Watch the Original Video
Blue Team CTF Walkthrough: DFIR
The Cyber Mentor
31m 8sAbout This Source
The Cyber Mentor
The Cyber Mentor, a YouTube channel with nearly a million subscribers, has been a pivotal resource in cybersecurity education since 2018. It aims to bridge the knowledge gap by offering affordable and practical cybersecurity courses. The channel's mission is to provide comprehensive resources for both newcomers and seasoned professionals in the cybersecurity field.
Read full source profileMore Like This
Unlocking Strategic Genius: 6 Essential Mental Models
Explore six mental models to enhance decision-making by embracing complexity and rejecting oversimplification.
Mastering Memory: The Ladder to Lasting Knowledge
Explore Dr. Justin Sung's Memory Ladder framework to learn effectively and retain knowledge forever with neuroscience-backed strategies.