2011 NPS Language Drives
In 2011 the Naval Postgraduate School created disk images for several scenarios. They are: 2011-nps-1weaponsdetection 2011-nps-2weapons/ 2011-nps-4drugtraffic/ 2011-nps-5control/
Digital Corpora
Sponsored by the AWS Open Data Sponsorship Program
In 2011 the Naval Postgraduate School created disk images for several scenarios. They are: 2011-nps-1weaponsdetection 2011-nps-2weapons/ 2011-nps-4drugtraffic/ 2011-nps-5control/
The submission contains four raw (dd) image files of the USB flash disk «Transcend JF V10 / 1GB, D33193», two packet capture (pcap) files and four log files. The disk is non-partitioned and contains no file systems; it contains many non-deterministic sectors (each sector contains 512 bytes). Namely, each sector that doesn’t belong to a…
2010-nps-emails is a test disk that can be used for testing programs that find email addresses or perform string search. The disk image consists of 30 different email addresses, each one stored in a different document with a different coding scheme. Below are a list of the email addresses and their codings: email address Application…
You can download any file using this new base URL: https://downlods.digitalcorpora.org/corpora/ For example, corpus file drives/nps-2014-xbox1/narrative.txt can be downloaded from: https://downloads.digitalcorpora.org/corpora/drives/nps-2014-xbox1/narrative.txt You can browse the DigitalCorpora S3 bucket using our browser at https://downloads.digitalcorpora.org/corpora/. You can also use our JavaScript browser: https://digitalcorpora.org/s3_browser.html
The DigitalCorpora project recently joined the AWS Open Data Sponsorship Program. This means that big changes are underway, and they are all for the better! Under the Open Data program, we will be transitioning the digitalcorpora corpus to storage in Amazon S3. We will have a gateway to preserve the existing links at http://downloads.digitalcorpora.org/corpora/, but…
We are happy to announce the contribution of four disk images of a non-deterministic USB drive. Read More.
A malware scan of the is now available at http://digitalcorpora.org/corp/nps/files/govdocs1/MetascanClientLog_201306281214.txt
Solutions Solution packets for these scenarios are available as encrypted PDF and ZIP files, including: M57-Patents Nitroba PCAP Solutions M57-Jean 2012 National Gallery DC Attack Scenario 2018 Lone Wolf Scenario 2019 Narcos Scenario Please note: the decrypt password is only available to faculty at accredited educational institutions, trainers and researchers working for the US Government,…
File bulk_extractor-1.3.1.zip contains the source code for bulk_extractor v1.3.1. bulk_extractor is a C++ program that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system or file system structures. bulk_extractor is typically downloaded on a Fedora system and compiled or cross-compiled to Linux, Mac, or…
The M57-Jean scenario is a single disk image scenario involving the exfiltration of corporate documents from the laptop of a senior executive. The scenario involves a small start-up company, M57.Biz. A few weeks into inception a confidential spreadsheet that contains the names and salaries of the company’s key employees was found posted to the “comments”…