There’re a lot of discussions out there on social media regarding how to get started or improve yourself or set yourself apart in cybersecurity, and lot of the advice centers around doing things yourself; setting up a home lab, using various tools, etc. A lot of this advice is also centered around pen testing and red teaming; while it’s not discussed as much, there is a lot you can do if you’re interested in digital forensics, and the cool thing is that you don’t have to “set up a home lab” to fully engage in most of it. All you need is a way to download the images and any tools you want, to a system to do the work on.
Fortunately, there are a number of sites where you can find these images, to practice doing analysis, or to engage in tool testing. Also, many of these sites are on lists…I’ve developed a list of my own, for example. Amongst the various available lists, there’s most assuredly going to be duplication, so just be aware of that going in. That being said, let’s take a look at some of the lists…
The folks at ArsenalRecon posted a list of publicly available images, and Brett Shavers followed up by sharing a DFIR Training link of “test” images.
Dr. Ali Hadi has a list of challenge images (he graciously allowed me to use one of them in Investigating Windows Systems), as well as a blog with some very valuable pos
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from Windows Incident Response
Read the original article: