Programming
Hacktivision
Scenario Description
We have reason to believe that the suspect has stolen a sensitive piece of virtual technology from CyberX. This virtual technology belonged to a group of OSINT professionals who worked for CyberX and the suspect was a part of there team. From what we were told this virtual technology was used to replicate a mobile device but that was the extent of what they could share. Determine if the suspect stole this virtual technology and if so where were you able to find it and what was on the device.