Conceivable conceivable possible choices of Repository
- Fingers-on Virtual Forensics Labs: designed for Scholars and School
- Linux-based lab: All labs are purely consistent with Kali Linux
- Lab screenshots: Each and every lab has PPTs with instruction screenshots
- Complete: Cover many subjects in electronic forensics
- Loose: All equipment are open supply
- Up-to-the-minute: The problem is funded by the use of DOJ and can stay updating
- Two formalized forensic intelligence in JSON wisdom based-on case research
Desk of Contents (updating)
- Basic Computer Skills for Virtual Forensics
- Computer and Virtual Forensics (up-to-the-minute on Oct. 2021)
- Computer Forensics Case Learn about
- Mobile Forensics Case Learn about
- Forensic Intelligence Repository
- Instrument Get able
# The next instructions will organize all equipment wanted for Knowledge Leakage Case. We will improve the script as a way to add further equipment for moderately a large number of labs briefly.
wget https://uncooked.githubusercontent.com/frankwxu/digital-forensics-lab/primary/Lend a hand/tool-install-zsh.sh
chmod +x tool-install-zsh.sh
Investigating P2P Knowledge Leakage
The P2P knowledge leakage case know about is to assist scholars to use moderately numerous forensic tactics to research highbrow assets robbery involving P2P. The know about come with
- A big and complex case involving a uTorrent shopper. The case is very similar to NIST knowledge leakage lab. Alternatively, it supplies a clearer and further detailed timeline.
- Cast proof with explanations. Each and every proof this is related to each process is printed together with the timeline. We propose the use of this ahead of know about NIST knowledge leakage case know about.
- 10 hands-on labs/subjects in electronic forensics
Investigating NIST Knowledge Leakage
The case know about is to research a picture involving highbrow assets robbery. The know about come with
- A big and complex case know about created by the use of NIST. You are able to get right of entry to the Senario, DD/Encase photos. You are able to additionally to find the answers on their internet web internet web page.
- 14 hands-on labs/subjects in electronic forensics
Investigating Unlawful Ownership of Photos
The case know about is to research the unlawful ownership of Rhino photos. This symbol was once as soon as contributed by the use of Dr. Golden G. Richard III, and was once as soon as first of all used all over the place the DFRWS 2005 RODEO CHALLENGE. NIST hosts the USB DD symbol. A replica of the picture may be to be had all over the place the repository.
Investigating Electronic message Harassment
The case know about is to research the harassment email despatched by the use of a scholar to a school member. The case is hosted by the use of digitalcorpora.org. You are able to get right of entry to the senario description and team of workers web internet web page visitors from their internet web internet web page. The repository very best possible supplies lab directions.
Investigating Unlawful Report Transferring (Reminiscence Forensics )
The case know about is to research computer reminiscence for reconstructing a timeline of unlawful knowledge transferring. The case features a state of affairs of switch refined wisdom from a server to a USB.
|Labs||Subjects Lined||Measurement of PPTs|
|Lab 0||Reminiscence Forensics||11M|
|segment 1||Perceive the Suspect and Accounts|
|segment 2||Perceive the Suspect’s PC|
|segment 3||Group of workers Forensics|
|segment 4||Examine Command Historical past|
|segment 5||Examine Suspect’s USB|
|segment 6||Examine Web Explorer Historical past|
|segment 7||Examine Report Explorer Historical past|
|segment 8||Timeline Research|
Investigating Hacking Case
Investigating Android 10
The picture is created by the use of Joshua Hickman and hosted by the use of digitalcorpora.
- Frank Xu
- Malcolm Hayward
- Richard (Max) Wheeless
Supply : KitPloit – PenTest Equipment!