top of page

Search


From Chaos to Chronology: The Power of Forensic Timelines
In incident response, attackers leave behind thousands of artifacts but without context, they’re just scattered clues. Forensic timelines bring those events into order, helping investigators reconstruct the attack, identify gaps in the analysis, and understand the full story of a compromise.
Mar 99 min read


Utilizing QELP for Rapid ESXi Analysis
Learn how to use the QELP tool to quickly triage ESXi servers. Parse through the relevant logs quickly in order to investigate malicious activity.
Oct 31, 20256 min read


Linux Forensics - Collecting a Triage Image Using The UAC Tool
Learn how to take a triage image of a *nix based system using the UAC tool.
Apr 27, 20247 min read
bottom of page