Latest Blog Post

read more

News and Events

August 2-5, 2014 - "Network Forensics: Black Hat Release" at Black Hat USA in Las Vegas, NV (Sherri Davidoff and Jonathan Ham) Space is limited, so register today!
August 7-10, 2014 - Join us at DEF CON 22 and play our annual Network Forensics Puzzle Contest.
LinkedIn Reddit Delicious Technorati Twitter Digg Stumbleupon

Join our Email Newsletter

Class and Book

Want "Network Forensics" (the class) taught privately at your facilities? Request an Onsite

Order Network Forensics: Tracking Hackers Through Cyberspace!

read more
Need Expert Consulting?

Request a Quote

Email Us an RFP

Network Forensics: Supplemental Materials

Welcome readers! Here you'll find the evidence files for each case study in the book Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012). You can download them and follow along with the book to gain hands-on experience.

Please note that these materials are copyrighted. We are offering them publicly for the community to enjoy for your personal use. You can read the full license here; below is a quick summary:

You CAN:

  • Use these materials for self-study
  • Display the contents in presentations for educational use. Please use proper attribution and link back.

You may NOT:

  • Redistribute these materials
  • Use these materials for commercial purposes.

If you'd like to distribute these materials or use them for commercial purposes, please ask first.

Thank you for all of your contributions, and have fun!

Chapter Case Study Evidence
Chapter 4

Ann's Rendezvous

Chapter 5

The Curious Mr. X

Chapter 6

HackMe, Inc.

Chapter 7

Inter0ptic Saves the Planet (Part 1 of 2)

Chapter 8

L0ne Sh4rk's Revenge

Chapter 9

Ann's Coffee Ring

Chapter 10

Inter0ptic Saves the Planet (Part 2 of 2)

Chapter 11

Ann Tunnels Underground

Chapter 12

Ann's Aurora