Featured

Hacking and DFIR Lab [Part 1 – Owning the Network]

This will be a two part series showing the different methodologies between an attacker and an investigator. This first part will consist of us acting as the attacker taking over a network. Disclaimer: This is for educational purposes only. I’m not responsible if you decide to use any of these techniques shown for illegal purposes. […]

Read More Hacking and DFIR Lab [Part 1 – Owning the Network]
Featured

DFIR Scenario #1 Lone Wolf

Introduction This fictional digital investigation scenario examines the disk image and memory of a person’s laptop that was seized. The suspect in question is believed to be planning a mass shooting attack. Our role as the forensic investigator is to find evidence that either supports or disproves this allegation. Acquisition The forensic examiner present during […]

Read More DFIR Scenario #1 Lone Wolf