Hands-on cybersecurity and digital forensics investigations completed during my Cybersecurity program at Northeastern Illinois University.
These projects demonstrate practical experience in:
• malware analysis
• Windows and Linux forensic investigations
• disk image analysis
• volatile artifact collection
• file recovery and data carving
• network traffic analysis
Performed static analysis on a suspicious Windows executable to identify indicators of compromise, analyze the Portable Executable (PE) structure, and investigate potential malicious behavior.
Investigated Windows system artifacts including event logs, user activity, and system processes to reconstruct system behavior and identify security-relevant events.
Analyzed Linux system artifacts, network activity, and potential rootkit indicators using forensic analysis and network scanning tools.
Collected and analyzed volatile artifacts from a running system including active processes, network connections, routing tables, and memory-related system information.
Used Autopsy to analyze a forensic disk image, examine file system structures, recover artifacts, and reconstruct potential user activity.
Recovered deleted files and artifacts from storage media using forensic disk imaging and data carving techniques.
Analyzed a TLS-encrypted HTTPS session using Wireshark to examine the TCP connection establishment, TLS handshake process, certificate exchange, cipher suite negotiation, and encrypted application data.
The investigations in this repository follow a structured digital forensic and security analysis methodology:
- Evidence identification and collection
- Artifact and packet analysis
- Indicator identification
- Correlation of system or network activity
- Documentation of findings and security implications
This methodology reflects common practices used in digital forensics and incident response (DFIR) investigations.
- Static malware analysis
- Windows forensic artifact analysis
- Linux system investigation
- Volatile data collection
- Disk image forensic analysis
- File recovery and data carving
- Network traffic analysis
- TLS handshake investigation
- Log analysis
- Network security fundamentals
- Autopsy
- Sleuth Kit
- Sysinternals
- Linux forensic utilities
- PE file inspection
- Strings analysis
- VirusTotal
- Hybrid Analysis
- Wireshark
- Packet inspection and protocol analysis
- Linux
- Windows
- VirtualBox