Skip to content

Module 9 —

9.1-tor-forensics-what-can-actually-be-recovered

9.2-blockchain-forensics-behavioral-clustering

9.3-memory-analysis-techniques-in-hidden-service-hosts

9.4-host-fingerprinting-through-subtle-misconfigurations

9.5-metadata-leaks-in-hosting-environments

9.6-detecting-botnets-in-hidden-networks

9.7-correlating-hidden-service-behavior-with-clearnet-artifacts

9.8-intelligence-linking-through-linguistic-stylometry