Where to go from here

If you like to test the tools and knowledge gained from this book, we have the following two tips for you:

  • Create a lab with two virtual machines—Metasploit and Metasploitable. Try to hack into your Metasploitable system and perform a forensic analysis afterwards. Are you able to reconstruct the attack and gather all the Indicators of Compromise?
  • Get some old hard drives, which are no longer used but have been used regularly in the past. Perform a forensic analysis on these drives and try to reconstruct as much data as possible. Are you able to reconstruct former operations on these drives?

If you like to enhance your knowledge on some of the topics that were covered in this book, the following books are a really good choice: ...

Get Mastering Python Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.