The Open University
Browse
TEXT
README.txt (1.94 kB)
.E01
20240606-defaced_ecomm-Ubuntu_22.04.3.E01 (1.46 GB)
.E02
20240606-defaced_ecomm-Ubuntu_22.04.3.E02 (1.46 GB)
.E03
20240606-defaced_ecomm-Ubuntu_22.04.3.E03 (1.46 GB)
.E04
20240606-defaced_ecomm-Ubuntu_22.04.3.E04 (1.17 GB)
1/0
5 files

Defaced web server (Ubuntu 22.04) (simulation)

dataset
posted on 2024-06-24, 13:39 authored by Benjamin Donnachie, Patrick WongPatrick Wong, Ian KennedyIan Kennedy, Adrian Hopgood

Simulated network intrusion as part of research to develop artificial intelligence / machine learning for post-breach triage. All information contained within the image (including but not limited to usernames, credit card numbers and IP addresses) is synthetic.

Simulated UK-based ecommerce website. As part of the scenario, DVWA (Damned vulnerable web app) was used to simulate coding errors on 28th May 2024. Morning of 6th June 2024 the system was discovered to be defaced. Forensic experts were engaged and a forensic image taken in EnCase E01 format (also known as Expert Witness Format).

Many thanks to my PhD supervisors, Prof Adrian Hopgood, Dr Patrick Wong and Dr Ian Kennedy. Thanks also to jmeter, VirtualBox, generatedata.com, Kali Linux, DVWA, GreyNoise.io and many more.

For further information, see the README.TXT file. To request ground truth for research purposes, please contact Benjamin Donnachie using benjamin.donnachie@open.ac.uk

History

Research Group

  • Centre for Research in Computing (CRC)

Usage metrics

    Faculty of Science, Technology, Engineering and Mathematics (STEM)

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC