web
analytics

Test Images and ChallengesRSS

Add your listing here

cyberforensicschallenge.com/challenges/

The Black T-Shirt Cyber Forensics Challenge will be run annually each spring. There will be mini-challenges held at different times throughout the year, including the fall.   The contests are designed to address a variety of elements, which are importan ...
Read More...

github.com/ctfs/write-ups-2017/tree/master/bsidessf-ctf-2017

Every one of these images contains the same hidden message. What's it say? Hint: it starts with 'FLAG:'! Hint2: - The name is meaningful. What else can 'x' mean? - Each individual image is enough to solve it Hint 3: - "The original name was execimage" ...
Read More...

www.cs.cmu.edu/~enron/

"This dataset was collected and prepared by the CALO Project (A Cognitive Assistant that Learns and Organizes). It contains data from about 150 users, mostly senior management of Enron, organized into folders. The corpus contains a total of abou ...
Read More...

www.shortinfosec.net/2008/07/competition-computer-forensic.h

Shortinfosec is hosting a computer forensics competition.In the competition, you will have to analyze a submitted disk image for incriminating evidence, as per the scenario belowScenarioThe investigators suspect that the employee was doing the following i ...
Read More...

contagiodump.blogspot.co.uk/2013/04/collection-of-pcap-files

"We have been adding pcaps to the collection so remember to check out the folder ( Pcap collection) for the recent pcaps.  I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various publ ...
Read More...

Containers

0 reviews

www.cfreds.nist.gov/SearchingContainerFiles.html

The images are intended for testing forensic string search tools. files and nests have the same content but differ in the way each was structured. While FILES contains archives with one level of compression, NESTS contains archives with both root and chil ...
Read More...

github.com/cyphernix/challenges

"This directory contains a set of Cryptographic/Security challenges for the purposes of fun forensic analysis."  github.com/cyphernix/challenges

www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html

The purpose of this work is to learn various types of data leakage, and practice its investigation techniques.   Scenario Overview ‘Iaman Informant’ was working as a manager of the technology development division at a famous international company O ...
Read More...

www.cfreds.nist.gov/Controlv1_0/DCFL_Control_Standard_V1_0.h

The files contained in this archive can be used as a control to test the accuracy and effectiveness of forensic tools such as Encase, FTK, Ilook, etc.  If you have any suggestions or comments please email [email protected]

digitalforensics.securitytreasurehunt.com

Welcome to the Digital Forensics Security Treasure Hunt, an online environment designed to help identify people with digital forensics interest and skills. Various challenges will be posted here that test participants' knowledge and skills in various area ...
Read More...

dftt.sourceforge.net

"Testing in the public view is an important part of increasing confidence in software and hardware tools. Developing extensive and exhaustive tests for digital investigation tools is a lengthy and complex process, which the Computer Forensic Tool Tes ...
Read More...

digitalcorpora.org

"DigitalCorpora.org is a website of digital corpora for use in computer forensics education research. All of the disk images, memory dumps, and network packet captures available on this website are freely available and may be used without prior authorizat ...
Read More...

www.cfreds.nist.gov/mem/Basic_Memory_Images.html

The archive, a .RAR file, (http://www.rarlab.com/) contains images from the following systems.All of the 'boomer' systems were not engaged in any malicious or evennetwork based activity at the time of imaging. The boomer system has1GB of RAM.

betweentwodfirns.blogspot.com/2016/06/forensic-ctf-bobs-chil

drive.google.com/file/d/0B9v_bn3f4uetYUtTWDZuanlDNG8/view?usp=sharing betweentwodfirns.blogspot.com/2016/06/forensic-ctf-bobs-chili-burgers-website.html

betweentwodfirns.blogspot.com/2016/11/forensic-ctf-baud-jame

betweentwodfirns.blogspot.com/2016/11/forensic-ctf-baud-james-baud.html drive.google.com/open?id=0B9v_bn3f4uetZWt4cmxQVmNRa1E 

www.cfreds.nist.gov/FileCarving/index.html

This page contains links to dd images for the use of testing software applications with file carving capabilities. File carving is the practice of extracting files based on content, rather than on metadata. Extracting files from unallocated blocks is acco ...
Read More...

www.forensickb.com/2008/01/forensic-practical.html

"I run several honeypots and I decided to take some of the malware found on the honeypots and install it on clean computer systems and watch its behavior. To take it a step further for those of you who like to hone your forensic skills, I have decided to ...
Read More...

www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx

Hacme Bank™ is designed to teach application developers, programmers, architects and security professionals how to create secure software. Hacme Bank simulates a "real-world" web services-enabled online banking application, which was built with a number o ...
Read More...

hannuvisti forge

0 reviews

github.com/hannuvisti/forge

"ForGe Forensic test image generator"  github.com/hannuvisti/forge

github.com/isislab/CTF-Challenges

CTF Challenges A repository of challenges from various CTF competitions.

strangelyrelevant.blogspot.com/2013/08/jackcr-issa-2013-netw

Unlike @JackCR's previous challenges, this one is 1. from a Linux server, and 2. does not have a memory component. Well, that is not entirely accurate, there is a memory dump but it is not usable because of the way that vmss2core produces a file that is n ...
Read More...

www.icir.org/enterprise-tracing/download.html

"A set of 11GB of packet header traces from October 2004 through January 2005 is available via FTP."  www.icir.org/enterprise-tracing/download.html

tuts4you.com/download.php?list.17

Nice collection of tutorials aimed particularly for newbie reverse enginners..