Accounts to access the instance are available at the bottom of the page.
IRIS is not optimized to be used on phones. We recommend accessing it from a computer.
If you notice anything suspicious or have any question, please contact us.
Note that the instance might be reset at any moment.
By accessing this instance you confirm you read, understand and agree with all the information on this page.
This demonstration instance is shared and we cannot guarantee the privacy of data you might upload on it. We are not responsible for any data loss or data leak.
To better understand the use of this instance, DFIR-IRIS uses a privacy-friendly cookie-less analytics. DFIR-IRIS does not collect any personal data. DFIR-IRIS does not use any third-party analytics and uses a self-hosted Plausible instance.
If you find a vulnerability, contact us before going public as it may impact systems already in production.
In other words, please respect a responsible disclosure of 30 days. We will patch and then publish the vulnerability. Depending on the finding a CVE might be requested, and will have your name - except if you don't want to.
You can report anything you find at email@example.com.
The scope of the security tests is limited to the Web Application IRIS hosted on v200.beta.dfir-iris.org.
Subdomains, SSH, scanning of the IP, BF, and other flavors are out of scope.
user_std_XX) to administrative rights (
adm_XX) on IRIS
user_std_XX) to code execution on the server
user_std_XX) read data of non-accessible cases (titled
Restricted Case XXX)
administratoraccount cannot be updated nor deleted.
You can read more about IRIS on the official documentation website.
IRIS is an open source app, so you can directly access the code on GitHub.