# Forensic Exercises

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FlcfWY4Mb2tdPbYesN3iN%2Fforensics.jpg?alt=media\&token=1f42c717-0d06-4ce2-b552-6234375a93b0)

### Chapters

* [Disk Forensics](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/disk-forensics)
* [Windows Forensics](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/windows-forensics)
* [Memory Forensics](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/memory-forensics)
* [Image Forensics](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/image-forensics)
* [Browser Forensics](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/browser-forensics)

### Exercises

* [Mail Header Analysis](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/mail-header-analysis)
* [Timestomping Exercise](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/timestomping-exercise)

### Other Exercises that contain Forensic content

* [tcp dump analysis from ftp session](https://cas-cyber.gitbook.io/cas-cybersecurity/malware-analysis/yara/tcp-dump-analysis)&#x20;
* [Memorydump analysis with volatility and yara](https://cas-cyber.gitbook.io/cas-cybersecurity/malware-analysis/yara/memory-dump-analysis)
