A company?s web server has been breached through their website. Our team arrived just in time to take a forensic image of the running system and its memory for further analysis. "?
www.binary-zone.com/2015/09/16/digital-foren ... Read More...
"This directory contains a set of Cryptographic/Security challenges for the purposes of fun forensic analysis." ?github.com/cyphernix/challenges
"A cyber security challenge that uses forensic analysis of image files using the "string" function in either Windows or Unix."
The Black T-Shirt Cyber Forensics Challenge will be run annually each spring. There will be mini-challenges held at different times throughout the year, including the fall.
The contests?are designed to address a variety of elements, w ... Read More...
Every one of these images contains the same hidden message. What's it say?
Hint: it starts with 'FLAG:'! Hint2: - The name is meaningful. What else can 'x' mean? - Each individual image is enough to solve it Hint 3: - "The original name was exe ... Read More...
Since April 2015, this website has served as a set of levels that simulate challenges and puzzles that one may encounter during an ARG (Alternate Reality Game) including simple ciphers, steganography, different types of encodings, and familiarity with ... Read More...
Unlike @JackCR's previous challenges, this one is 1. from a Linux server, and 2. does not have a memory component. Well, that is not entirely accurate, there is a memory dump but it is not usable because of the way that vmss2core produces a file that i ... Read More...
Welcome to the Digital Forensics Security Treasure Hunt, an online environment designed to help identify people with digital forensics interest and skills. Various challenges will be posted here that test participants' knowledge and skills in various a ... Read More...
The aim of this challenge is to identify the means by which an insider may accidentally or maliciously leak organisational secrets via seemingly innocent files.
A repository of challenges from various CTF competitions.
A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place.
The NICE Challenge Project was created to develop virtual challenges and environments to test students and professionals alike on their ability to perform NICE Cybersecurity Workforce Framework tasks and exhibit their knowledge, skills, and abilities. ... Read More...
This holiday season I have created a network forensics challenge for the community to try and solve. This scenario, called ?Spy Hunter ? Operation Hermes? is the first in a new series I am going to create and publish here at My War With Entropy.
Page 1 of 4
© 2019 Copyright | DFIR Training