Where to go from here
If you like to test the tools and knowledge gained from this book, we have the following two tips for you:
Create a lab with two virtual machines—Metasploit and Metasploitable. Try to hack into your Metasploitable system and perform a forensic analysis afterwards. Are you able to reconstruct the attack and gather all the Indicators of Compromise?
Get some old hard drives, which are no longer used but have been used regularly in the past. Perform a forensic analysis on these drives and try to reconstruct as much data as possible. Are you able to reconstruct former operations on these drives?
If you like to enhance your knowledge on some of the topics that were covered in this book, the following books are a really good choice:
Practical Mobile Forensics by Satish Bommisetty, Rohit Tamma, Heather Mahalik, Packt Publishing
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy and AAron Walters...