The case illustrates the power of structured host-based triage — beginning with logs and EDR, and moving through file inspection, RAM capture, and finally, network artifact confirmation.
cybersecurity digital-forensics memory-forensics mimikatz lsass credential-dumping windows-forensics host-triage powershell-analysis edr-analysis cybersecurity-case-study
-
Updated
May 1, 2025 - Jupyter Notebook