forensicfocus.com
Test Images
Computer Forensic Reference Data Sets (CFReDS)
www.cfreds.nist.gov
The CFReDS site is a repository of reference sets/images of simulated
digital evidence for examination. Some images are produced by NIST,
often from the CFTT (tool testing) project, and some are contributed by
other organizations.
Digital Corpora
digitalcorpora.org
A website of digital corpora for use in computer forensics research.
Some of the corpora on this website are freely available, while others
are only available to researchers under special arrangement.
Digital Forensics Tool Testing Images
dftt.sourceforge.net
File system and disk images from Brian Carrier for testing digital forensic analysis and acquisition tools.
HogFly's Memory Dumps
forensicir.blogspot.com
Available on HogFly's skydrive here.
Linux LEO
linuxleo.com
This site is intended to assist members of the computer forensic
community learn more about Linux and its potential as a forensic tool.
Various practice images are available under the heading "Supplemental
Files" in the left hand side menu.
Wireshark Sample Captures
wiki.wireshark.org/SampleCaptures
A large number of sample packet captures to use with Wireshark.
Wireshark Study Guide Trace Files
www.wiresharkbook.com/downloads.html
Trace files referenced by Laura Chappell throughout the Wireshark Certified Network Analyst Study Guide.
Enron Email Dataset
www.cs.cmu.edu/~enron/
This dataset contains data from about 150 users, mostly senior
management of Enron, organized into folders. It contains a total of
about 0.5M messages originally made public, and posted to the web, by
the Federal Energy Regulatory Commission during its investigation. After
various corrections (notably by Melinda Gervasio at SRI) and redactions
it is now made available by William W. Cohen at CMU.
==> Read More
Subscribe to:
Post Comments (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)
No comments:
Post a Comment