Description
DFSP # 499 Linux top 10
2025-09-0925:05
DFSP # 498 Windows top 10
2025-09-0219:27
DFSP # 497 ticket to ride
2025-08-2615:44
DFSP # 496 Signed, Sealed, Exploited
2025-08-1912:35
DFSP # 495 Corrupted from within
2025-08-1214:03
DFSP # 494 the request is out there
2025-08-0517:48
DFSP # 493 Stop, Share, and Listen
2025-07-2917:21
DFSP # 492 A Bit of TCP
2025-07-2220:37
DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”
2025-07-1513:47
DFSP # 490 Unveiling the USN Journal
2025-07-0812:13
DFSP # 489 Hidden Gateways
2025-07-0114:41
DFSP # 488 SSH & Red Herrings
2025-06-2416:53
DFSP # 487 Unmasking Malicious Activity with 4688
2025-06-1713:51
DFSP # 486 Squid Games
2025-06-1019:35
DFSP # 485 Certifiably Suspicious
2025-06-0314:00
DFSP # 485 BAM! Packing Punch
2025-05-2710:58
DFSP # 483 Cooking up Forensics with Chef
2025-05-2014:36
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
2025-05-1320:41
DFSP # 481 Triage outside the Core
2025-05-0620:08
DFSP # 480 Hidden risks of nested groups
2025-04-2913:59
0.5x
0.8x
1.0x
1.25x
1.5x
2.0x
3.0x
Sleep Timer
Off
End of Episode
5 Minutes
10 Minutes
15 Minutes
30 Minutes
45 Minutes
60 Minutes
120 Minutes