"DigitalCorpora.org is a website of digital corpora for use in computer forensics education research. All of the disk images, memory dumps, and network packet captures available on this website are freely available and may be used without prior authorizat ...
"This dataset was collected and prepared by the CALO Project (A Cognitive Assistant that Learns and Organizes). It contains data from about 150 users, mostly senior management of Enron, organized into folders. The corpus contains a total of about 0.5M mes ...
Description OS Art of Memory Forensics Images Assorted Windows, Linux, and Mac Mac OSX 10.8.3 x64 Mac Mountain Lion 10.8.3 x64 Jackcr's forensic challenge Windows XP x86 and Windows 200 ...
"The Case: A company?s web server has been breached through their website. Our team arrived just in time to take a forensic image of the running system and its memory for further analysis. "? www.binary-zone.com/2015/09/16/digital-forensic-challenge-4/ ...
"DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown security problems in SDN by employing a fuzzing technique. Agent-Manger is the ...
"So you're at home tonight, having just installed Wireshark. You want to take the program for a test drive. But your home LAN doesn't have any interesting or exotic packets on it? Here's some goodies to try. Please note that if for some reason your versi ...
"Testing in the public view is an important part of increasing confidence in software and hardware tools. Developing extensive and exhaustive tests for digital investigation tools is a lengthy and complex process, which the?Computer Forensic Tool Testing ...
"I run several honeypots and I decided to take some of the malware found on the honeypots and install it on clean computer systems and watch its behavior. To take it a step further for those of you who like to hone your forensic skills, I have decided to ...
"This is a list of public packet capture repositories, which are freely available on the Internet. Most of the sites listed below share Full Packet Capture (FPC) files, but some do unfortunately only have truncated frames." Cyber Defence Exercises ( ...
"We have been adding pcaps to the collection so remember to check out?the folder (?Pcap collection) for the recent pcaps.? I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various public sources. You ...
"I'm publishing a sample Active Directory database file (ntds.dit) together with the corresponding SYSTEM registry hive so that you can practice hash extraction and password cracking."blog.didierstevens.com/2016/07/12/practice-ntds-dit-file-part-1/amp/ ...
"A cyber security challenge that uses forensic analysis of image files using the "string" function in either Windows or Unix."
"NIST is developing?Computer Forensic Reference Data Sets?(CFReDS)?for digital evidence. These reference data sets (CFReDS) provide to an investigator documented sets of simulated digital evidence for examination.? Since CFReDS would have documented conte ...
"This directory contains a set of Cryptographic/Security challenges for the purposes of fun forensic analysis." ?github.com/cyphernix/challenges
\"ForGe Forensic test image generator\" github.com/hannuvisti/forge
Page 1 of 6
Training and Events
Associations and Organizations
Higher Education Programs
DFIR Blogger Feeds
Forms, Templates, & Guides
Infographics & Cheat Sheets
Podcasts & Live Streams
Test Images & Challenges
Search DFIR Training
© 2018 Copyright | DFIR Training