DIGITAL FORENSICS:Challenge Treasure Hunt
วันนี้่จะมาแนะนำการฝึกทำ Digital Forensics ในเว็บ http://securitytreasurehunt.com
แพลตฟอร์ม securitytreasurehunt เป็นสภาพแวดล้อมออนไลน์ที่ออกแบบมาเพื่อช่วยระบุผู้ที่มีความสนใจและทักษะด้านความปลอดภัยของข้อมูล ความท้าทายต่างๆจะถูกโพสต์ไว้ที่นี่เพื่อทดสอบความรู้และทักษะของผู้เข้าร่วมในด้านต่างๆของการรักษาความปลอดภัยข้อมูลเช่น Digital Forensics ทุกคนสามารถเข้าร่วมได้
To begin using this environment, simply follow the link below to the challenge you are interested in, or browse by category on the left. Once registered with the Question Engine, participants can enroll in the quiz associated with a particular challenge. Most quizzes have no time limit, and everything is open book, open Internet, and open to the public.
Links to existing challenges can be found below, arranged by level of difficulty. Check back often for new challenges!
https://questionengine.securitytreasurehunt.com/
Digital Forensics |
|
Level 1 |
|
Level 2 |
|
Level 3 |
|
Level 4 |
|
Level 5 |
DF500 |
Digital Forensics Challenge Treasure Hunt – Round 1
Digital Forensics Challenge Treasure Hunt – Round 2
The second round of the Digital Forensics Challenge is now available! This challenge, written by Mike Murr of the SANS Digital Forensics Team, requires participants to analyze a graphical image file to answer questions. To participate, click the Question Engine link to the left, register, and make sure you enroll in the Digital Forensics Challenge Treasure Hunt - Round 2 quiz.
Digital Forensics Challenge Treasure Hunt – Round 3
The third round of the Digital Forensics Challenge is now available! This challenge, written by the DC3 Challenge Team, requires participants to analyze a series of graphical image files (contained in a ZIP file) to answer questions.
Digital Forensics Challenge Treasure Hunt – Round 4
The fourth round of the Digital Forensics Challenge is now available! This challenge, written by the DC3 Challenge Team, requires participants to analyze a series of files (contained in a ZIP file) to answer questions.
The Department of Defense Cyber Crime Center (DC3) has received a request for a digital forensics exam from a Defense Criminal Investigative Organization. After the SUBJECT of the investigation seized laptop was imaged, its hard drive is reviewed by a DCFL (Defense Computer Forensics Lab) computer forensic examiner. The examiner identifies a set of 13 files that have been marked as suspicious in a single directory.
With your knowledge and skills, the examiner has provided you with a copy of the 13 suspicious files and asked you to identify the file signatures for each file. In addition, the agent that submitted the case has several questions they want answered for their report and to increase their general knowledge.
Click here to download the ZIP file containing the files to analyze.
SHA1: 18b4055f7119bd17dac61d2c755db68ca0aebbee
Web Vulnerability Assessment Security Treasure Hunt
Navy Security Treasure Hunt
ฝึกทำLab Digital Forensics
* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ
Congratulations to everyone reading this, I just discovered the best plug of hacking and breaking into any form of gadget devices contact termitehacking at protonmail dot com and figure this hacker out yourself like I did and thank me later.
ReplyDelete