Digital Forensic Challenge Images (Datasets)

This page contains all the digital forensic challenges (datasets) I prepare either for a training course I teach, a DFIR challenge done @Security4Arabs, testing an application or written code, or just for fun! The current challenges are: Challenge #1, Challenge #2, Challenge #3, Challenge #4, Challenge #5, Challenge #6, Challenge #7, and different Linux Forensic Cases. More will be added soon, so keep checking the site for updates.

Note: if you have any comments or notes, please don't hesitate to contact me, I will do my best to get back to you ASAP. Also, if you use any of my work for your training, presentation, etc, I would appreciate if you inform me. Don't worry, I won't charge you anything, and use them for free as you like. I just want to be informed for referencing purposes only.


  • Challenge #1 - Web Server Case

  • A company’s web server has been breached through their website. Our team arrived just in time to take a forensic image of the running system and its memory for further analysis. All of the case files can be found here. Old upload could be found below (I'm using them as an alternative now):

    1. System Image: here
    2. System Memory: here
    3. Hashes: here
    4. Passwords = here
    5. Other download URLs from (Archive.org) could be found here: here
    To successfully solve this challenge, a report with answers to the tasks below is required:
    1. What type of attacks has been performed on the box?
    2. How many users has the attacker(s) added to the box, and how were they added?
    3. What leftovers (files, tools, info, etc) did the attacker(s) leave behind? (assume our team arrived in time and the attacker(s) couldn’t clean and cover their tracks)
    4. What software has been installed on the box, and were they installed by the attacker(s) or not?
    5. Using memory forensics, can you identify the type of shellcode used?
    6. What is the timeline analysis for all events that happened on the box?
    7. What is your hypothesis for the case, and what is your approach in solving it?
    8. Is there anything else you would like to add?
    Bonus Question: what are the directories and files, that have been added by the attacker(s)? List all with proof.
    Important Note: do not use commercial tools for your own learning benefit.

    End of Case.


  • Challenge #2 - User Policy Violation Case

  • This is another digital forensics image that was prepared to cover a full Windows Forensics course.

    1. System Image: here
    2. Hashes & Password: here
    3. Other download URLs from (Archive.org) could be found here: here
    You can use the image to learn the following:
    1. File Carving, Custom Carving, and Keyword Searching
    2. File System Forensics - NTFS
    3. Deep Windows Registry Forensics: System and User Hives
      • SYSTEM
      • SOFTWARE
      • SAM
      • NTUSER.DAT
      • USRCLASS.DAT
    4. Other Windows Files: LNK, Jump Lists, Libraries, etc
    5. Application Compatibility Cache (ShimCache)
    6. Analyzing Windows Search (Search Charm)
    7. Analyzing Thumb Caches
    8. Analyzing Prefetch Files
    9. Analyzing Recycle Bin(s)
    10. USB Forensics
    11. Events Analysis
    12. Email Forensics: Web and Outlook
    13. Browser Forensics: Internet Explorer and Google Chrome
    14. Skype Forensics

    This image covers most if not all of the recent system artifacts that you might encounter. Let me know if you need any help or if you are an instructor and want the answers to each part of the case. I will only send the answers to verified instructors.

    End of Case.


  • Challenge #3 - Mystery Hacked System

  • This is another digital forensics image that was prepared to for a Windows and File System Forensics course. This is a little of a mystery, so I won't be giving out too much clues about what you can learn in this case, but I assure you, you can learn a lot ;)

    1. System Image: here
    2. Hashes: here
    3. Password = here
    4. Other download URLs from (Archive.org) could be found here: here

    One day an IT dept. guy/gal came to work to find the message below written in a file on his/her system! He/Her immediately reported that to you. Now you must:

  • How was this system hacked? (What is your hypothesis)
  • What evidence did you find that proves your hypothesis?
  • How did you approach and solve the case? (write a report)
  • Anything you would like to add?
  • End of Case.


  • Challenge #4 - Launching Attacks from Alternate Data Streams

  • This is another digital forensics image that was prepared for to test the following:
    1. Hidding EXEs in ADS
    2. Running Malicious EXEs from ADS
    3. Checking if Windows Defender (or other AVs), truly scan ADS
    4. Hiding Malicious EXEs in Stealthy ADS
    5. Showing How all of the above methods could be detected
    File are below:
    1. Forensic Image: here
    2. Hashes: here
    3. File List: here
    4. Other download URLs from (Archive.org) could be found here: here

    End of Case.


  • Challenge #5 - BSides Amman 2021 2nd Edition / Windows Forensics Workshop Case

  • CASE OVERVIEW: You have been given a system that has been used for some illegal activity were the user accessed confidential files that the user was not supposed to access. The system has two user accounts which are the main suspects involved in this case ("joker" and "IEUser"). You are required to provide answers to all the questions below by providing evidence (proof) with details and screenshots. Remember: SCREENSHOT OR IT DID NOT HAPPEN ;)

    All of the case files can be found here.

    They can also be found here and here too.

    To successfully solve this challenge, a report with answers to the tasks below is required:
    1. What is the hash value for the given forensic image?
    2. Which user account was used to access some confidential documents?
    3. Explain in detail what proof do you have to support your answer?
    4. Did the user access the confidential files from a local drive or network location?
    5. What proof do you have to support your answer?
    6. List all the files that were accessed with full paths.
    7. Provide two different evidence to prove that those files were truly accessed.
    8. Which application was used to open any of the confidential document(s)?
    9. The next three questions are related to the image with the text "AnotherPassword4U" found inside the user's home directory.
    10. What is the full path to the files of interest?
    11. What is the Volume Serial Number where the file exists?
    12. What are the Modified, Accessed, and Creation (MAC) timestamps in UTC for the file?
    13. The DCode.exe application was used by one of the users. Provide evidence to the next four questions below, but, be careful, this is a tricky question!!!
    14. Which user do you think ran the application and what evidence do you have to support your hypothesis?
    15. How many times was it used?
    16. When was it last used?
    17. Where was the application located (full path)?
    Important Note: do not use commercial tools for your own learning benefit.

    End of Case.


  • Challenge #6 - Browser Policy Violation Case

  • This is another digital forensics image that was prepared to cover Windows and Browser Forensic Artifacts.

    1. Files could be found: here

  • Challenge #7 - SysInternals Case

  • The user downloaded what they thought was the SysInternals tool suite, double-clicked it, but the tools did not open and were not accessible. Since that time, the user has noticed that the system has "slowed down" and become less and less responsive.

    1. Goal is to determine what happened, and when.
    2. Files could be found here: Mega or Archive

    Special Thanks to Harlan Carvey for helping form this case. Please check his amazing work here.


  • Linux Forensic Cases

  • These are four different cases to cover Linux forensic investigations and a brief could be found below:
    1. Case1: Compromised Web Server
    2. Case2: Compromised Hadoop (HDFS) Cluster
    3. Case3: Attacker's Kali Linux System
    4. Case4: Investigating/Hunting Hidden Processes
    All case files could be found here

    End of Summary.


Copyright © 2011-2021, Ali Hadi | Design by Andreas Viklund | Site Map | RSS Feeds.

[Valid RSS] Valid XHTML 1.0 Strict Valid CSS!