Forensic Challenge

August 1, 2011

Forensic Challenge 8 – Submission deadline passed

Folks, the submission deadline for the Forensic Challenge 8 – “Malware Reverse Engineering” – put up by Guido Landi and Angelo Dell’Aera from the Sysenter Chapter […]
July 1, 2011

Forensic Challenge 8 – “Malware Reverse Engineering” – Deadline Extended Again

We are realizing that the Forensic Challenge 8 – “Malware Reverse Engineering” – is really difficult to solve because right now we received just 5 submissions. […]
June 27, 2011

Forensic Challenge 8 “Malware Reverse Engineering” – 4 days left!

Folks, Forensic Challenge 8 “Malware Reverse Engineering” put up by Guido Landi and Angelo Dell’Aera from the Sysenter Chapter is in full swing. Submissions are due […]
June 9, 2011

Forensic Challenge 8 – “Malware Reverse Engineering” – Deadline Extended

Taking a look at the first submissions it seems like the Forensic Challenge 8 – “Malware Reverse Engineering” – is quite difficult to solve. For this […]
May 9, 2011

Forensic Challenge 8 – “Malware Reverse Engineering”

I am pleased to announce the next forensic challenge: Forensic Challenge 8 – “Malware Reverse Engineering”. The challenge has been created by Angelo Dell’Aera and Guido […]
May 2, 2011

Forensic Challenge 7 – Publication of Results Delayed

An important update for Forensic Challenge 7 challengers. For reasons related to reviewers’ everyday job committments the challenge results will be announced on Friday, May 6th […]
April 5, 2011

Forensic Challenge 7 – Submission deadline passed

Folks the submission deadline for the Forensic Challenge 7 – “Forensic Analysis of a Compromised System” – put up by Hugo Gonzalez from the Mexico Chapter […]
March 26, 2011

Forensic Challange 7 – Only 5 days left!

Folks, challenge 7 – forensic analysis of a compromised server – put up by Hugo Gonzalez from the Mexico Chapter and Guillaume Arcas from the French […]
January 22, 2011

Forensic Challenge 2010/5 – Log Mysteries – What Apache version was used?

Carl Pulley, a loyal follower of our Forensic Challenges, has written up an analysis on how could one determine the Apache version that generated the logs. […]