??? We Investigate Anything
  • Artifacts ▾
    • View all →
    • Security.evtx
    • Terminal Services
    • SMB
    • Linux
    • Winlogbeat
    • Cortex XDR
    • Prefetch
  • Tools ▾
    • View all →
    • Masstin
    • vshadow-rs
    • Sabonis
    • Persistence Boromir
  • Cases ▾
    • View all →
    • AD DFIR Lab
  • León ▾
    • View all →
    • Discover
    • Facendera Hacking
    • Events
    • Routes & Food
  • About
  • The Lore
  • ES

# Cases

Real investigations, CTF write-ups, and incident response walkthroughs.

2026-04-15 19 min read

AD DFIR Lab — Part 9: Collecting the Evidence — Forensic Imaging Pipeline

This is Part 9 of the AD DFIR Lab series. Part 8 gave us a noisy-ad-current snapshot packed with 2 years of realistic narrative. Part 9 pulls that snapshot out as a forensic image, intact and ready...

Read more →
2026-04-13 30 min read

AD DFIR Lab — Part 8: A Day in the Realm — Generating Two Years of Historical Noise

This is Part 8 of the AD DFIR Lab series. We turn a sterile clean-ad snapshot into noisy-ad-2years — a dataset that looks like a real company has been using the domain for two years.

Read more →
2026-04-13 8 min read

AD DFIR Lab — Part 7.5: Keeping the Kingdoms Alive — Eval Licenses and Lab Longevity

This is an interlude in the AD DFIR Lab series. A short operational post about keeping the lab running for years rather than months.

Read more →
2026-04-13 7 min read

AD DFIR Lab — Part 7: The Night King Rises — Kali as the Attack Platform

This is Part 7 of the AD DFIR Lab series. We get Kali ready for the attacks in Phase 9.

Read more →
2026-04-13 9 min read

AD DFIR Lab — Part 6: Ravens and Whispers — Audit Configuration with Sysmon and auditd

This is Part 6 of the AD DFIR Lab series. We configure all the auditing before running the attacks — if we don’t do it now, the attacks won’t leave a trace.

Read more →
2026-04-13 9 min read

AD DFIR Lab — Part 5: The Smallfolk — Users, Groups and Vulnerabilities in GOAD

This is Part 5 of the AD DFIR Lab series. We catalog everything GOAD creates inside the domains: users, groups, vulnerabilities, and how they fit together to form realistic attack chains.

Read more →
2026-04-13 7 min read

AD DFIR Lab — Part 4: Crowning the Domain Controllers — Active Directory with GOAD

This is Part 4 of the AD DFIR Lab series. We deploy the entire Active Directory structure: two forests, a child domain, and the cross-forest trust.

Read more →
2026-04-12 8 min read

AD DFIR Lab — Part 3: Beyond the Wall — pfSense, VLANs and Network Segmentation

This is Part 3 of the AD DFIR Lab series. We configure pfSense to separate the attack network from the corporate network, forcing Kali to pivot like an external attacker.

Read more →
2026-04-12 12 min read

AD DFIR Lab — Part 2: The Seven Kingdoms — Deploying Windows VMs with Unattended Install

This is Part 2 of the AD DFIR Lab series. We create all lab VMs with fully unattended installation.

Read more →
2026-04-12 6 min read

AD DFIR Lab — Part 1: From Bare Metal to Proxmox

This is Part 1 of the AD DFIR Lab series. We start from a freshly provisioned Hetzner dedicated server and end with Proxmox VE installed and ready to create virtual machines.

Read more →
2026-04-12 4 min read

The Iron Throne of DFIR — Building an Active Directory Lab for Forensic Training

Why you need an AD lab for DFIR

Read more →
???

We Investigate Anything

Digital Forensics & Incident Response

// Links

  • Artifacts
  • Tools
  • Cases

// Social

  • GitHub
  • X / Twitter
  • LinkedIn

© 2026 We Investigate Anything. All rights reserved.