📘
CAS Cybersecurity
search
Ctrlk
📘
CAS Cybersecurity
  • Start
  • Reconnaissance
  • Docker basics and Images
  • Scanning and Enumeration
  • Vulnerability Scanning and Analysis
  • Exploitation
  • Man in the Middle
  • Windows Hacking
  • Web Application Security
  • CTF and Crypto Exercises
  • Threat Intelligence
  • Forensic Exercises
    • Disk Forensics
    • Windows Forensics
    • Memory Forensics
    • Image Forensics
    • Browser Forensics
    • Mail Header Analysis
    • Timestomping Exercise
    • Network Forensics
  • Malware Analysis
  • Android Malware
  • Forensic Readiness
  • Live Response
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Forensic Exercises

hashtag
Chapters

  • Disk Forensics

  • Windows Forensics

  • Memory Forensics

  • Image Forensics

  • Browser Forensics

hashtag
Exercises

  • Mail Header Analysis

  • Timestomping Exercise

hashtag
Other Exercises that contain Forensic content

  • tcp dump analysis from ftp session

  • Memorydump analysis with volatility and yara

PreviousRFI Incoming!chevron-leftNextDisk Forensicschevron-right

Last updated 3 years ago

  • Chapters
  • Exercises
  • Other Exercises that contain Forensic content