2011 NPS Language Drives

In 2011 the Naval Postgraduate School created disk images for several scenarios. They are: 2011-nps-1weaponsdetection 2011-nps-2weapons/ 2011-nps-4drugtraffic/ 2011-nps-5control/

nps-2014-usb-nondeterministic

The submission contains four raw (dd) image files of the USB flash disk «Transcend JF V10 / 1GB, D33193», two packet capture (pcap) files and four log files. The disk is non-partitioned and contains no file systems; it contains many non-deterministic sectors (each sector contains 512 bytes). Namely, each sector that doesn’t belong to a…

nps-2010-emails

2010-nps-emails is a test disk that can be used for testing programs that find email addresses or perform string search. The disk image consists of 30 different email addresses, each one stored in a different document with a different coding scheme. Below are a list of the email addresses and their codings: email address Application…

DigitalCorpora is now available on Amazon S3

You can download any file using this new base URL: https://downlods.digitalcorpora.org/corpora/ For example, corpus file drives/nps-2014-xbox1/narrative.txt can be downloaded from: https://downloads.digitalcorpora.org/corpora/drives/nps-2014-xbox1/narrative.txt You can browse the DigitalCorpora S3 bucket using our browser at https://downloads.digitalcorpora.org/corpora/. You can also use our JavaScript browser: https://digitalcorpora.org/s3_browser.html

Obtaining Solutions

Solutions Solution packets for these scenarios are available as encrypted PDF and ZIP files, including: M57-Patents Nitroba PCAP Solutions M57-Jean 2012 National Gallery DC Attack Scenario 2018 Lone Wolf Scenario 2019 Narcos Scenario Please note: the decrypt password is only available to faculty at accredited educational institutions, trainers and researchers working for the US Government,…

Bulk Extractor News and Downloads

File bulk_extractor-1.3.1.zip contains the source code for bulk_extractor v1.3.1.  bulk_extractor is a C++ program that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system or file system structures.  bulk_extractor is typically downloaded on a Fedora system and compiled or cross-compiled to Linux, Mac, or…

2009 M57-Jean

The M57-Jean scenario is a single disk image scenario involving the exfiltration of corporate documents from the laptop of a senior executive. The scenario involves a small start-up company, M57.Biz. A few weeks into inception a confidential spreadsheet that contains the names and salaries of the company’s key employees was found posted to the “comments”…