These case files represent completed and developing simulated investigations used to demonstrate structured forensic methodology, disciplined evidence handling, and analytical reasoning.
Note: Content is simulated/academic. All cases are conducted in controlled lab environments for academic and professional development purposes.
A completed, simulated digital forensics investigation analyzing recurring after-hours outbound HTTPS activity. The case demonstrates baseline comparison, packet-level traffic analysis, persistence validation, and structured timeline reconstruction within a controlled lab environment.
Planned DFIR simulation on an isolated lab network: deterministic web exploit (DVWA) → foothold shell → root via misconfiguration → persistence (SSH authorized_keys + systemd service) → staged data exfiltration (scp/curl) with evidence-backed timeline reconstruction.