Breaking News



Conceivable conceivable possible choices of Repository

===================

  • Fingers-on Virtual Forensics Labs: designed for Scholars and School
  • Linux-based lab: All labs are purely consistent with Kali Linux
  • Lab screenshots: Each and every lab has PPTs with instruction screenshots
  • Complete: Cover many subjects in electronic forensics
  • Loose: All equipment are open supply
  • Up-to-the-minute: The problem is funded by the use of DOJ and can stay updating
  • Two formalized forensic intelligence in JSON wisdom based-on case research

Desk of Contents (updating)

  • Basic Computer Skills for Virtual Forensics
  • Computer and Virtual Forensics (up-to-the-minute on Oct. 2021)
  • Computer Forensics Case Learn about
  • Mobile Forensics Case Learn about
  • Forensic Intelligence Repository
  • Instrument Get able
# The next instructions will organize all equipment wanted for Knowledge Leakage Case. We will improve the script as a way to add further equipment for moderately a large number of labs briefly.

wget https://uncooked.githubusercontent.com/frankwxu/digital-forensics-lab/primary/Lend a hand/tool-install-zsh.sh
chmod +x tool-install-zsh.sh
./tool-install-zsh.sh

Investigating P2P Knowledge Leakage

==============

The P2P knowledge leakage case know about is to assist scholars to use moderately numerous forensic tactics to research highbrow assets robbery involving P2P. The know about come with

  • A big and complex case involving a uTorrent shopper. The case is very similar to NIST knowledge leakage lab. Alternatively, it supplies a clearer and further detailed timeline.
  • Cast proof with explanations. Each and every proof this is related to each process is printed together with the timeline. We propose the use of this ahead of know about NIST knowledge leakage case know about.
  • 10 hands-on labs/subjects in electronic forensics

Subjects Lined

Investigating NIST Knowledge Leakage

==============

The case know about is to research a picture involving highbrow assets robbery. The know about come with

  • A big and complex case know about created by the use of NIST. You are able to get right of entry to the Senario, DD/Encase photos. You are able to additionally to find the answers on their internet web internet web page.
  • 14 hands-on labs/subjects in electronic forensics

Subjects Lined

Investigating Unlawful Ownership of Photos

=====================

The case know about is to research the unlawful ownership of Rhino photos. This symbol was once as soon as contributed by the use of Dr. Golden G. Richard III, and was once as soon as first of all used all over the place the DFRWS 2005 RODEO CHALLENGE. NIST hosts the USB DD symbol. A replica of the picture may be to be had all over the place the repository.

Subjects Lined

Investigating Electronic message Harassment

=========

The case know about is to research the harassment email despatched by the use of a scholar to a school member. The case is hosted by the use of digitalcorpora.org. You are able to get right of entry to the senario description and team of workers web internet web page visitors from their internet web internet web page. The repository very best possible supplies lab directions.

Subjects Lined

Investigating Unlawful Report Transferring (Reminiscence Forensics )

=========

The case know about is to research computer reminiscence for reconstructing a timeline of unlawful knowledge transferring. The case features a state of affairs of switch refined wisdom from a server to a USB.

Subjects Lined

LabsSubjects LinedMeasurement of PPTs
Lab 0Reminiscence Forensics11M
segment 1Perceive the Suspect and Accounts
segment 2Perceive the Suspect’s PC
segment 3Group of workers Forensics
segment 4Examine Command Historical past
segment 5Examine Suspect’s USB
segment 6Examine Web Explorer Historical past
segment 7Examine Report Explorer Historical past
segment 8Timeline Research

Investigating Hacking Case

=========

The case know about, together with a disk symbol provided by the use of NIST is to research a hacker who intercepts web web internet web page visitors within vary of Wi-fi Get right to use Issues.

Subjects Lined

Investigating Android 10

The picture is created by the use of Joshua Hickman and hosted by the use of digitalcorpora.

=========

Equipment Used

========

Contribution

=============

  • Frank Xu
  • Malcolm Hayward
  • Richard (Max) Wheeless

Supply : KitPloit – PenTest Equipment!


Leave a Reply

Your email address will not be published.

Donate Us

X