9.1-tor-forensics-what-can-actually-be-recovered
Module 9 —
9.2-blockchain-forensics-behavioral-clustering
9.3-memory-analysis-techniques-in-hidden-service-hosts
9.4-host-fingerprinting-through-subtle-misconfigurations
9.5-metadata-leaks-in-hosting-environments
9.6-detecting-botnets-in-hidden-networks
9.7-correlating-hidden-service-behavior-with-clearnet-artifacts
9.8-intelligence-linking-through-linguistic-stylometry