Difference between revisions of "DC3 Digital Forensics Challenge"

From Forensics Wiki
Jump to: navigation, search
m (Fixed AccessData link)
(Added details for 2007)
Line 3: Line 3:
 
== 2007 ==
 
== 2007 ==
  
At the 2007 DoD Cybercrime conference, the DC3 staff said there would be another challenge in 2007 and gave a timetable for it. As of 25 Feb 2007 no new details have been announced.
+
Registration for the 2007 challenge opened on 13 April. Although no date has been set for when the problems will be mailed out, the solutions will be due no later than 1 November. The winner will be announced on 15th of that month. The winner of the challenge will receive a free trip to the 2008 DoD Cyber Crime [[Conferences|conference]].
 
+
  
 
== 2006 ==
 
== 2006 ==
Line 10: Line 9:
 
The 2006 challenge was the first sponsored by the DC3. Entrants were asked to solve puzzles in Audio Steganography, Steganography using S-Tools, Password Cracking, Image Analysis: Real vs. CG, Data Carving: Linux LVM Interpretation, Data Acquisition: Boot a dd Image, Data Acquisition: Boot a Split dd Image, Media Recovery: Compact-disc, Media Recovery: Floppy Diskette, Keylog Cracking, and Metadata Extraction.
 
The 2006 challenge was the first sponsored by the DC3. Entrants were asked to solve puzzles in Audio Steganography, Steganography using S-Tools, Password Cracking, Image Analysis: Real vs. CG, Data Carving: Linux LVM Interpretation, Data Acquisition: Boot a dd Image, Data Acquisition: Boot a Split dd Image, Media Recovery: Compact-disc, Media Recovery: Floppy Diskette, Keylog Cracking, and Metadata Extraction.
  
One hundred and forty teams requested challenge packets, but only 21 teams submitted entries. The winning team, announced on 15 Dec 2006, was [[AccessData]]. They won a free trip to the [[Defense Cybercrime Center|DC3's]] annual [[Conferences|conference]] in St. Louis, MO in January 2007. They presented a complete solution at the conference.
+
One hundred and forty teams requested challenge packets, but only 21 teams submitted entries. The winning team, announced on 15 Dec 2006, was [[AccessData]]. They won a free trip to the [[Defense Cyber Crime Center|DC3's]] annual [[Conferences|conference]] in St. Louis, MO in January 2007. They presented a complete solution at the conference.
  
 
Challenge submissions were broken down by academic, civilian, commercial, military, and government entrants. International teams from Australia, Canada, France, and India all requested packets, but were not elligble to win.
 
Challenge submissions were broken down by academic, civilian, commercial, military, and government entrants. International teams from Australia, Canada, France, and India all requested packets, but were not elligble to win.

Revision as of 17:30, 16 April 2007

The DC3 Digital Forensics Challenge is an annual forensics contest sponsored by the Defense Cybercrime Center.

2007

Registration for the 2007 challenge opened on 13 April. Although no date has been set for when the problems will be mailed out, the solutions will be due no later than 1 November. The winner will be announced on 15th of that month. The winner of the challenge will receive a free trip to the 2008 DoD Cyber Crime conference.

2006

The 2006 challenge was the first sponsored by the DC3. Entrants were asked to solve puzzles in Audio Steganography, Steganography using S-Tools, Password Cracking, Image Analysis: Real vs. CG, Data Carving: Linux LVM Interpretation, Data Acquisition: Boot a dd Image, Data Acquisition: Boot a Split dd Image, Media Recovery: Compact-disc, Media Recovery: Floppy Diskette, Keylog Cracking, and Metadata Extraction.

One hundred and forty teams requested challenge packets, but only 21 teams submitted entries. The winning team, announced on 15 Dec 2006, was AccessData. They won a free trip to the DC3's annual conference in St. Louis, MO in January 2007. They presented a complete solution at the conference.

Challenge submissions were broken down by academic, civilian, commercial, military, and government entrants. International teams from Australia, Canada, France, and India all requested packets, but were not elligble to win.


External Links