- Communication analysis
- Log analysis
- Path tracing
- Disk imaging
- MAC time analysis (Modify, Access, Create)
- Content analysis
- Slack space analysis
- Steganography
- Reverse engineering
- Malicious code review
- Exploit Review
This Information Security blog is about my views and experiences in the information security, computer forensics and incident response industry as a student, professional and educator.
No comments:
Post a Comment