Lista de imágenes de prueba y escenarios


No existe mejor forma de ser bueno en algo que la practica, por esa razón les dejo una lista de imágenes para que se practiquen y analicen cada una de las soluciones posibles.

Computer Forensic Reference Data Sets (CFReDS)



The CFReDS site is a repository of images. Some images are produced by NIST, often from the CFTT (tool testing) project, and some are contributed by other organizations. National Institute of Justice funded this work in part through an interagency agreement with the NIST Office of Law Enforcement Standards.



Digital Corpora


Simson Garfinkel is a website of digital corpora for use in computer forensics research. Some of the corpora on this website are freely available, while others are only available to researchers under special arrangement.

Images include

* Cell Phone Dumps
* Disk Images
* Files
* Scenarios



Digital Forensics Tool Testing (DFTT)


Brian Carrier

A collection of file system and disk images that test the functionality of analysis tools.



PST files from Enron Energy Corporation


Electronic Discovery Reference Model (EDRM)

EDRM – the Electronic Discovery Reference Model – was created in 2005 by George Socha and Tom Gelbmann. Since 2005, over 300 e-discovery experts, vendors and end-users from more than 125 organizations have worked together to address the lack of standards and guidelines in the electronic discovery (e-discovery) market.

The EDRM reference model provides a common, flexible and extensible framework for the development, selection, evaluation and use of electronic discovery products and services. The completed model was placed in the public domain in May 2006.

The disktype File System Sampler


Christoph Pfisterer

The disktype File System Sampler is a collection of disk images with various file systems. Its purpose is to aid in the testing and development of the disktype program.



Fuentes | Open Source Digital Forensics



Toda la información proporcionada en este medio es para fines educativos, en ningún caso alguno se hace responsable e cualquier mal uso de la información. Toda la información es para el desarrollo e investigación de métodos de seguridad informática.

No olvides visitar nuestra hacking shop