Skip to content

A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.

License

Notifications You must be signed in to change notification settings

usrtem/Digital-Forensics-Labwork

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

3 Commits
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿงฎ Digital Forensics Lab Work

This repository contains a collection of hands-on digital forensics labs focused on Linux, Windows, mobile, and network environments. The labs emphasize practical techniques used in real-world investigations such as timeline reconstruction, artifact recovery, user activity correlation, and memory analysis.

๐Ÿ“„ Contents

๐Ÿ“š Table of Contents

  1. Applying the Daubert Standard to Forensic Evidence
    Examines the admissibility of forensic techniques using legal standards for scientific reliability.

  2. Recognizing the Use of Steganography in Image and Audio Files
    Identifies and analyzes hidden data embedded in multimedia files.

  3. Recovering Deleted and Damaged Files
    Demonstrates data recovery through file carving and hex-level analysis.

  4. Conducting an Incident Response Investigation
    Documents key steps in live response and post-breach evidence collection.

  5. Forensic Investigations on Windows Systems
    Investigates Windows-specific artifacts like registry keys, logs, and application usage traces.

  6. Forensic Investigations on Linux Systems
    Analyzes bash history, system logs, cron jobs, and shell artifact correlation.

  7. Email and Chat Log Analysis
    Examines metadata, headers, and message content for signs of tampering or exfiltration.

  8. Mobile Device Forensics
    Focuses on device acquisition, application artifact recovery, and location data interpretation.

  9. Network Infrastructure Forensics
    Analyzes router, firewall, and DHCP logs to identify compromise patterns and unauthorized access.

  10. System Memory Forensics
    Extracts volatile data, running processes, injected code, and registry fragments from live memory.


๐Ÿ›  Tools & Techniques Used

  • SleuthKit (fls, istat, mactime)
  • auditd and ausearch
  • Memory analysis utilities
  • File carving tools and hex editors
  • Linux and Windows command-line forensics
  • Timeline reconstruction and user behavior profiling

๐Ÿ‘ค Author

Michael Twining
Cybersecurity Researcher | Digital Forensics & Incident Response | GitHub: @usrtem
๐Ÿ“ซ michael.twining@outlook.com
๐ŸŒ LinkedIn | YouTube


๐Ÿ” License

This project is licensed under the Creative Commons Attribution 4.0 International License.

About

A collection of digital forensics lab reports covering Linux artifact recovery, shell history analysis, bash script forensics, and incident reconstruction using tools like SleuthKit, Auditd, and command-line utilities.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published