<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Seth Enoka – DFIR</title><link>https://sethenoka.com/</link><description>Recent content on Seth Enoka – DFIR</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 25 Mar 2026 20:00:00 +0000</lastBuildDate><atom:link href="https://sethenoka.com/index.xml" rel="self" type="application/rss+xml"/><item><title>ShellBags and User Navigation: What Windows Remembers About Exploration</title><link>https://sethenoka.com/shellbags-and-user-navigation-what-windows-remembers-about-exploration/</link><pubDate>Wed, 25 Mar 2026 20:00:00 +0000</pubDate><guid>https://sethenoka.com/shellbags-and-user-navigation-what-windows-remembers-about-exploration/</guid><description>&lt;p&gt;ShellBags are often treated as proof of access to a directory, proof of awareness of a file, or proof of intent. None of those claims are defensible on ShellBags alone.&lt;/p&gt;
&lt;p&gt;ShellBags are better understood as Windows remembering where the shell has been asked to render a folder view for a user. That can be strong evidence of navigation and exploration. It can also be weak evidence of anything beyond that, depending on how the interaction occurred, what the environment looks like, and what else you can line up around it.&lt;/p&gt;</description></item><item><title>Cybersecurity Career Roadmap</title><link>https://sethenoka.com/cybersecurity-career-roadmap/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://sethenoka.com/cybersecurity-career-roadmap/</guid><description>&lt;hr&gt;
&lt;h2 id="cybersecurity-career-roadmap-dfir-incident-response-and-security-operations"&gt;Cybersecurity Career Roadmap (DFIR, Incident Response, and Security Operations)&lt;/h2&gt;
&lt;p&gt;Most cybersecurity career advice is either too generic or too disconnected from real-world work. This roadmap is designed to solve a more practical problem: &lt;em&gt;given where you are today, what should you do next to move forward in your career?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;It focuses on &lt;strong&gt;digital forensics, incident response (DFIR), and security operations (SOC)&lt;/strong&gt;; roles where technical depth, decision-making under pressure, and real-world experience matter more than theory. Whether you&amp;rsquo;re:&lt;/p&gt;</description></item><item><title>Windows Recycle Bin Forensics on Windows 10 and 11</title><link>https://sethenoka.com/windows-recycle-bin-forensics-on-windows-10-and-11/</link><pubDate>Mon, 16 Feb 2026 22:00:00 +0000</pubDate><guid>https://sethenoka.com/windows-recycle-bin-forensics-on-windows-10-and-11/</guid><description>&lt;p&gt;In a surprising number of investigations, the Recycle Bin is the difference between &lt;em&gt;we think something was removed&lt;/em&gt; and &lt;em&gt;we can show what was removed, from where, and roughly when&lt;/em&gt;. It&amp;rsquo;s also an artefact that&amp;rsquo;s easy to misunderstand or misinterpret. The Recycle Bin preserves evidence of a particular class of deletion behaviour: deletions on a &lt;strong&gt;given volume&lt;/strong&gt;, under a &lt;strong&gt;given user context&lt;/strong&gt;, within the limits of &lt;strong&gt;configuration and capacity&lt;/strong&gt;, usually using the &lt;strong&gt;Windows shell&lt;/strong&gt; (but not always).&lt;/p&gt;</description></item><item><title>Windows Artefacts as Evidence</title><link>https://sethenoka.com/windows-artefacts/</link><pubDate>Mon, 16 Feb 2026 00:00:00 +0000</pubDate><guid>https://sethenoka.com/windows-artefacts/</guid><description>&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/windows-artefacts/understanding_windows_artefacts_featured_image_hu_24b3a137f88dc628.webp 480w, https://sethenoka.com/windows-artefacts/understanding_windows_artefacts_featured_image_hu_4c7a974e3f423a42.webp 960w"
 sizes="(max-width: 480px) 100vw, 480px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/windows-artefacts/understanding_windows_artefacts_featured_image_hu_61898c087013e21c.png"
 srcset="https://sethenoka.com/windows-artefacts/understanding_windows_artefacts_featured_image_hu_61898c087013e21c.png 480w, https://sethenoka.com/windows-artefacts/understanding_windows_artefacts_featured_image_hu_29d9e2a4f2bc73a6.png 960w"
 sizes="(max-width: 480px) 100vw, 480px"
 width="480"
 height="320"
 alt="Windows Artefacts Series"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;Windows artefacts are one of the most important sources of evidence in digital forensics and incident response (DFIR) investigations. Filesystem metadata, registry entries, execution traces, and application artefacts all leave traces that investigators use to reconstruct activity on Windows systems.&lt;/p&gt;
&lt;p&gt;This series focuses on Windows forensic artefacts on Windows 10 and Windows 11, explaining what these artefacts can reliably prove, what they can&amp;rsquo;t, and how investigators should interpret them during real-world incident response.&lt;/p&gt;</description></item><item><title>Understanding Windows Artefacts as Evidence, Not Indicators</title><link>https://sethenoka.com/understanding-windows-artefacts-as-evidence-not-indicators/</link><pubDate>Mon, 19 Jan 2026 23:00:00 +0000</pubDate><guid>https://sethenoka.com/understanding-windows-artefacts-as-evidence-not-indicators/</guid><description>&lt;p&gt;Windows forensic artefacts are one of the core evidence sources used in digital forensics and incident response (DFIR) investigations. On Windows endpoints, artefacts such as Prefetch, ShellBags, &lt;a href="https://sethenoka.com/windows-recycle-bin-forensics-on-windows-10-and-11/"&gt;Recycle Bin&lt;/a&gt; metadata, event logs, and registry traces help investigators reconstruct what happened on a system.&lt;/p&gt;
&lt;p&gt;Yet Windows endpoint investigations still tend to fail in predictable ways. Not because analysts can&amp;rsquo;t extract artefacts. Most junior and mid-career practitioners can acquire an image, parse common sources, and build a timeline. The failure is usually interpretive. An artefact is treated as a deterministic indicator, or as proof of an action, when it&amp;rsquo;s only a partial trace of a system behaviour. This post is about that gap.&lt;/p&gt;</description></item><item><title>A Roadmap to Earning Your First (or Next) SANS Certification</title><link>https://sethenoka.com/a-roadmap-to-earning-your-first-or-next-sans-certification/</link><pubDate>Sat, 25 Mar 2023 10:50:00 +0000</pubDate><guid>https://sethenoka.com/a-roadmap-to-earning-your-first-or-next-sans-certification/</guid><description>&lt;p&gt;SANS is widely regarded as one of the leading providers of cybersecurity training. Their courses and GIAC certifications cover everything from early-career security analysts to senior incident responders and digital forensics specialists.&lt;/p&gt;
&lt;p&gt;Because their catalogue is large and constantly expanding, a lot of people struggle with the question:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Which SANS certification should I take first, and what should come next?&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The official &lt;a href="https://www.sans.org/cyber-security-skills-roadmap"&gt;SANS Cybersecurity Skills Roadmap&lt;/a&gt; is a useful starting point:&lt;/p&gt;</description></item><item><title>Unlocking the DFIR Job Market: Strategies for Landing Your Dream Role</title><link>https://sethenoka.com/unlocking-the-dfir-job-market-strategies-for-landing-your-dream-role/</link><pubDate>Sat, 18 Mar 2023 20:54:00 +0000</pubDate><guid>https://sethenoka.com/unlocking-the-dfir-job-market-strategies-for-landing-your-dream-role/</guid><description>&lt;p&gt;&lt;strong&gt;tl;dr:&lt;/strong&gt; This blog aims to aggregate what I’ve found meaningful while job hunting in my career, and to be a useful resource to anyone interested in a career in DFIR. If you don&amp;rsquo;t care what I think, skip to the bottom for people who said it better than me.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve been thinking about and talking to a lot of early-career professionals recently and wanted to document some of the discussions we&amp;rsquo;ve had. A lot of people seem lost; they want a career in cybersecurity but &lt;a href="https://sethenoka.com/career-coaching/"&gt;don&amp;rsquo;t really know where to start&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Alternate Data Streams</title><link>https://sethenoka.com/alternate-data-streams/</link><pubDate>Sat, 18 Mar 2023 03:38:00 +0000</pubDate><guid>https://sethenoka.com/alternate-data-streams/</guid><description>&lt;p&gt;Here&amp;rsquo;s a quick write‑up on Alternate Data Streams (ADS). An ADS is a file attribute used in NTFS that can provide investigators with &lt;a href="https://sethenoka.com/understanding-windows-artefacts-as-evidence-not-indicators/"&gt;valuable evidence that might otherwise be overlooked&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;An ADS is an additional named stream of data that a user can attach to a file or folder on Windows systems. It&amp;rsquo;s effectively hidden data associated with a visible file (or written alongside a regular file) and is not visible in standard file browsers such as File Explorer. The original intent of ADS was to allow files to contain additional metadata or alternate data that&amp;rsquo;s not part of the primary file content.&lt;/p&gt;</description></item><item><title>Create a Personal Forensics Lab Part 6: The CentOS Workstation</title><link>https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/</link><pubDate>Fri, 03 May 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/</guid><description>&lt;p&gt;This (for now anyway) will be the last post in this series, in which we&amp;rsquo;ll add a CentOS 7 x64 workstation to our lab. At this point, the lab looks a little like this:&lt;/p&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/lab_diagramv1.5_hu_70ef46658c3ec7cc.webp 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/lab_diagramv1.5_hu_5f72f8b3b14da27c.webp 805w"
 sizes="(max-width: 768px) 100vw, 768px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/lab_diagramv1.5_hu_cda04fbf118bab4d.png"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/lab_diagramv1.5_hu_cda04fbf118bab4d.png 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-6-the-centos-workstation/lab_diagramv1.5_hu_5c68056930aa616a.png 805w"
 sizes="(max-width: 768px) 100vw, 768px"
 width="768"
 height="553"
 alt="Lab diagram"
 class=""
 loading="eager"
 fetchpriority="high"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;There are some slight nuances to adding a CentOS box to a Windows domain, and we&amp;rsquo;ll go into greater detail below. Similar to the other systems, we want CentOS in a DFIR lab for the opportunity to find artefacts, auth logs, time sources, etc.&lt;/p&gt;</description></item><item><title>Create a Personal Forensics Lab Part 5: The Windows 7 Workstations</title><link>https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/</link><pubDate>Fri, 26 Apr 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/</guid><description>&lt;p&gt;By the fifth instalment of the &amp;lsquo;build your own lab&amp;rsquo; series, the lab already resembles this network diagram (or should, anyway):&lt;/p&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/lab_diagramv1.4-1_hu_e2d43914db0c31ff.webp 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/lab_diagramv1.4-1_hu_a12fce11ca243c38.webp 805w"
 sizes="(max-width: 768px) 100vw, 768px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/lab_diagramv1.4-1_hu_dfbacaab1af74705.png"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/lab_diagramv1.4-1_hu_dfbacaab1af74705.png 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-5-the-windows-7-workstations/lab_diagramv1.4-1_hu_6b6f42680d4ede90.png 805w"
 sizes="(max-width: 768px) 100vw, 768px"
 width="768"
 height="553"
 alt="Lab diagram"
 class=""
 loading="eager"
 fetchpriority="high"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;As the title suggests, it&amp;rsquo;s time to install the Windows 7 workstation(s).&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-Plain" data-lang="Plain"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;NB: Windows 7 is end-of-life at this point and is included here strictly for [legacy forensics and artefact comparison purposes](/windows-artefacts/).
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="workstation-configuration"&gt;Workstation Configuration&lt;/h2&gt;
&lt;p&gt;During the installation, Windows asks for a user name and a computer name. Enter these during setup to save a step later in the process.&lt;/p&gt;</description></item><item><title>Create a Personal Forensics Lab Part 4: The Windows 8.1 Workstation</title><link>https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/</link><pubDate>Fri, 19 Apr 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/</guid><description>&lt;p&gt;By this point, part 4 of the series, our lab looks something like this:&lt;/p&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/lab_diagramv1.3_hu_8d53882cb6aeaac7.webp 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/lab_diagramv1.3_hu_970499c9f342c655.webp 792w"
 sizes="(max-width: 768px) 100vw, 768px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/lab_diagramv1.3_hu_1ea9680a40598b6d.png"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/lab_diagramv1.3_hu_1ea9680a40598b6d.png 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-4-the-windows-8-1-workstation/lab_diagramv1.3_hu_ca1873fd9996425f.png 792w"
 sizes="(max-width: 768px) 100vw, 768px"
 width="768"
 height="567"
 alt="Lab diagram"
 class=""
 loading="eager"
 fetchpriority="high"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;In this instalment, it&amp;rsquo;s time to add the Windows 8.1 workstation to the environment. The issue with this ISO when compared to all the others is that Windows 8.1 doesn&amp;rsquo;t allow the OS to be installed without a licence key. As a result, some finagling is required (read: an extra step to get the ISO ready before attempting to install the OS).&lt;/p&gt;</description></item><item><title>Create a Personal Forensics Lab Part 3: The Windows 10 Workstation</title><link>https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/</link><pubDate>Fri, 12 Apr 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/</guid><description>&lt;p&gt;If you haven&amp;rsquo;t already, complete parts &lt;a href="https://sethenoka.com/create-a-personal-forensics-lab-part-1-the-primary-domain-controller/"&gt;one&lt;/a&gt; and &lt;a href="https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/"&gt;two&lt;/a&gt; of this guide on building a personal forensics lab in the cloud, which cover creating the Windows Server 2016 primary domain controller (DC), DHCP and DNS server, and the Windows Server 2012 R2 secondary DC.&lt;/p&gt;
&lt;p&gt;At this point, the lab should look like this:&lt;/p&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/lab_diagramv1.2_hu_42e54eceb1b0b020.webp 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/lab_diagramv1.2_hu_2e95aaec11d0479e.webp 792w"
 sizes="(max-width: 768px) 100vw, 768px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/lab_diagramv1.2_hu_6e534e4b047a95b2.png"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/lab_diagramv1.2_hu_6e534e4b047a95b2.png 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-3-the-windows-10-workstation/lab_diagramv1.2_hu_d0afd0e23d5dd8dd.png 792w"
 sizes="(max-width: 768px) 100vw, 768px"
 width="768"
 height="567"
 alt="Lab diagram"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;I&amp;rsquo;ve chosen to put a single Windows 10 x64 workstation in the environment, but there may be value in adding a 32-bit version as well. There are some things that may only work on one or the other, and it could be interesting to see how forensic artefacts might behave differently between the two versions of the same OS (which is why there are two Windows 7 workstations planned).&lt;/p&gt;</description></item><item><title>Create a Personal Forensics Lab Part 2: The Secondary Domain Controller</title><link>https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/</link><pubDate>Fri, 05 Apr 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/</guid><description>&lt;p&gt;If you haven&amp;rsquo;t already completed &lt;a href="https://sethenoka.com/create-a-personal-forensics-lab-part-1-the-primary-domain-controller/"&gt;part one&lt;/a&gt; of this series, &lt;strong&gt;Creating the Primary Domain Controller&lt;/strong&gt;, I suggest you visit that page first. If, on the other hand, you have at least the primary DC configured, including DHCP, DNS, and Remote Access (NAT), please continue.&lt;/p&gt;
&lt;p&gt;At the end of part one, the lab network looked like this:&lt;/p&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/lab_diagramv1.1_hu_54fcae106c03162b.webp 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/lab_diagramv1.1_hu_b04e1507c75fb60c.webp 792w"
 sizes="(max-width: 768px) 100vw, 768px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/lab_diagramv1.1_hu_ad4440efe451c044.png"
 srcset="https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/lab_diagramv1.1_hu_ad4440efe451c044.png 768w, https://sethenoka.com/create-a-personal-forensics-lab-part-2-the-secondary-domain-controller/lab_diagramv1.1_hu_6ea529aada5a2745.png 792w"
 sizes="(max-width: 768px) 100vw, 768px"
 width="768"
 height="567"
 alt="Lab diagram"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;The focus of this post is to get a secondary DC up and running in the lab environment, hosted in the cloud. The assumption will be that the base OS installation has been completed per the earlier post.&lt;/p&gt;</description></item><item><title>Create a Personal Forensics Lab Part 1: The Primary Domain Controller</title><link>https://sethenoka.com/create-a-personal-forensics-lab-part-1-the-primary-domain-controller/</link><pubDate>Fri, 29 Mar 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/create-a-personal-forensics-lab-part-1-the-primary-domain-controller/</guid><description>&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-plain" data-lang="plain"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;NB: This post was originally written in 2019. Expect that some content may be dated at this point.
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;One of the major things I recommend to anyone working in DFIR – as well as network or systems administration – is to build a lab in which to test tools, techniques, theories, or anything else you might encounter in day‑to‑day work or personal research. This post is part one of a guide on building a very simple lab in a cloud environment. Readers earlier in their career will probably see more benefit from this series than those near the end, but the principles apply broadly to the industry.&lt;/p&gt;</description></item><item><title>Build Your Own Wireguard VPN Server with Pi-Hole for DNS Level Ad Blocking</title><link>https://sethenoka.com/build-your-own-wireguard-vpn-server-with-pi-hole-for-dns-level-ad-blocking/</link><pubDate>Fri, 22 Mar 2019 08:00:00 +0000</pubDate><guid>https://sethenoka.com/build-your-own-wireguard-vpn-server-with-pi-hole-for-dns-level-ad-blocking/</guid><description>&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-plain" data-lang="plain"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;NB: this blog was originally posted in 2019, some of the advice may be dated.
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Recently, a friend made me aware of an alternative to OpenVPN named &lt;a href="https://www.wireguard.com"&gt;Wireguard&lt;/a&gt;. It&amp;rsquo;s designed to be extremely lightweight with a small source code footprint which makes it easily auditable. A whitepaper defining the protocol has been produced and is available &lt;a href="https://www.wireguard.com/papers/wireguard.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;WireGuard uses UDP for communication and functions by routing some, or all, traffic through a virtual network interface, allowing for split tunnelling if desired. Traffic is encrypted and unencrypted using private/public key pairs, where each peer has the public key of the other(s). Hence, peers which are part of the same VPN can communicate with each other and roam between networks without much difficulty.&lt;/p&gt;</description></item><item><title>Build Your Own Forensics Go-Bag</title><link>https://sethenoka.com/build-your-own-forensics-go-bag/</link><pubDate>Tue, 12 Mar 2019 19:30:00 +0000</pubDate><guid>https://sethenoka.com/build-your-own-forensics-go-bag/</guid><description>&lt;p&gt;Everyone has their own take on the components which make up a basic DFIR go-bag for when that inevitable call from a client comes. I always have a small collection of devices and boot USBs with me which I think are useful in most cases, mostly because I&amp;rsquo;ve found myself in situations where any of these things would have been really helpful to have at hand. For larger incidents, I&amp;rsquo;d recommend having a larger case with a few more critical pieces of hardware, but we&amp;rsquo;ll get to that below.&lt;/p&gt;</description></item><item><title>Vultr and Virtio Part 2 – Creating Your Custom VM</title><link>https://sethenoka.com/creating-your-custom-vm/</link><pubDate>Tue, 15 May 2018 09:06:00 +0000</pubDate><guid>https://sethenoka.com/creating-your-custom-vm/</guid><description>&lt;p&gt;At this point, you&amp;rsquo;ve already created your &lt;a href="https://sethenoka.com/creating-a-custom-windows-iso/"&gt;custom Windows ISO&lt;/a&gt; and are now ready to use it to deploy a Windows virtual machine on &lt;a href="https://my.vultr.com/"&gt;Vultr&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="deploy-your-windows-server"&gt;Deploy Your Windows Server&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Log in to your &lt;a href="https://my.vultr.com/"&gt;Vultr&lt;/a&gt; account&lt;/li&gt;
&lt;li&gt;From the &lt;strong&gt;Servers&lt;/strong&gt; area, click &lt;strong&gt;Deploy New Server&lt;/strong&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.10.59_hu_116fc9a46df5f627.webp 1200w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.10.59_hu_4bb532718dd1b8f2.webp 2400w"
 sizes="(max-width: 1200px) 100vw, 1200px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.10.59_hu_6601b8fb1f5e1bed.png"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.10.59_hu_6601b8fb1f5e1bed.png 1200w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.10.59_hu_f6e169bda3ed402e.png 2400w"
 sizes="(max-width: 1200px) 100vw, 1200px"
 width="1200"
 height="149"
 alt="Deploy new server"
 class=""
 loading="eager"
 fetchpriority="high"
 decoding="async"
 /&gt;
&lt;/picture&gt;
&lt;/li&gt;
&lt;li&gt;Choose a server location&lt;/li&gt;
&lt;li&gt;Under &lt;strong&gt;Server Type&lt;/strong&gt;, select &lt;strong&gt;Upload ISO&lt;/strong&gt;, then choose the custom ISO you uploaded earlier
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.14.17_hu_74618fe2c341195e.webp 1200w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.14.17_hu_a90ec8ab675c7387.webp 1918w"
 sizes="(max-width: 1200px) 100vw, 1200px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.14.17_hu_825e5e26292f5f77.png"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.14.17_hu_825e5e26292f5f77.png 1200w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.14.17_hu_afbe51adec97877f.png 1918w"
 sizes="(max-width: 1200px) 100vw, 1200px"
 width="1200"
 height="372"
 alt="Select uploaded ISO"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;
&lt;/li&gt;
&lt;li&gt;Select the desired &lt;strong&gt;Server Size&lt;/strong&gt; and any &lt;strong&gt;Additional Features&lt;/strong&gt; as required&lt;/li&gt;
&lt;li&gt;Optionally provide a &lt;strong&gt;Server Name&lt;/strong&gt; and &lt;strong&gt;Label&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Review your configuration and click &lt;strong&gt;Deploy Now&lt;/strong&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.16.52_hu_eca84f0372a68468.webp 480w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.16.52_hu_a56c1814a35b7a8c.webp 690w"
 sizes="(max-width: 480px) 100vw, 480px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.16.52_hu_28404063d8099315.png"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.16.52_hu_28404063d8099315.png 480w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.16.52_hu_5e34fb6547a86c29.png 690w"
 sizes="(max-width: 480px) 100vw, 480px"
 width="480"
 height="88"
 alt="Deploy now"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;

Vultr will now provision the instance in the background. This can take 15 - 20 minutes. Once complete, you can open the server console and begin the Windows installation.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="install-windows"&gt;Install Windows&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Once the server is fully deployed, click the ellipsis next to the instance and select &lt;strong&gt;View Console&lt;/strong&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.20.04_hu_91e3925458746f7f.webp 480w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.20.04_hu_891e996f59076470.webp 492w"
 sizes="(max-width: 480px) 100vw, 480px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.20.04_hu_e76df0e63fd8e7c8.png"
 srcset="https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.20.04_hu_e76df0e63fd8e7c8.png 480w, https://sethenoka.com/creating-your-custom-vm/Screen-Shot-2018-05-15-at-11.20.04_hu_efc43e99819a1339.png 492w"
 sizes="(max-width: 480px) 100vw, 480px"
 width="480"
 height="671"
 alt="View console"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;
&lt;/p&gt;</description></item><item><title>Vultr and Virtio Part 1 – Creating a Custom Windows ISO</title><link>https://sethenoka.com/creating-a-custom-windows-iso/</link><pubDate>Mon, 14 May 2018 10:46:00 +0000</pubDate><guid>https://sethenoka.com/creating-a-custom-windows-iso/</guid><description>&lt;p&gt;In the past, I&amp;rsquo;ve had difficulty creating Windows virtual machines with Vultr and other VPS providers that require a custom ISO with VirtIO drivers. This post is primarily a how‑to so I can follow the process again in the future, but hopefully others will find it useful as well.&lt;/p&gt;
&lt;p&gt;This is the first in a two‑part series and covers creating and uploading the custom ISO. The &lt;a href="https://sethenoka.com/creating-your-custom-vm/"&gt;follow‑up post&lt;/a&gt; will cover using that ISO to create a VM.&lt;/p&gt;</description></item><item><title>About Seth</title><link>https://sethenoka.com/about-seth/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://sethenoka.com/about-seth/</guid><description>&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/about-seth/cropped-EnokaSeth_Media_hu_33b3d3643acc09a0.webp 480w, https://sethenoka.com/about-seth/cropped-EnokaSeth_Media_hu_e4d92b8f309a1a35.webp 960w"
 sizes="(max-width: 480px) 100vw, 480px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/about-seth/cropped-EnokaSeth_Media_hu_8e7de8ad22397f54.jpg"
 srcset="https://sethenoka.com/about-seth/cropped-EnokaSeth_Media_hu_8e7de8ad22397f54.jpg 480w, https://sethenoka.com/about-seth/cropped-EnokaSeth_Media_hu_69453c277ddb0f5d.jpg 960w"
 sizes="(max-width: 480px) 100vw, 480px"
 width="480"
 height="480"
 alt="Seth Enoka Headshot"
 class=""
 loading="eager"
 fetchpriority="high"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;Seth is a cyber security practitioner specialising in developing and strengthening &lt;a href="https://sethenoka.com/windows-artefacts/"&gt;digital forensics and incident response capability&lt;/a&gt; across complex and high-consequence environments.&lt;/p&gt;
&lt;p&gt;As Director and Principal Analyst at &lt;a href="https://lykosdefence.com/"&gt;Lykos Defence&lt;/a&gt;, Seth works with organisations across APAC to design, implement, and mature their DFIR programs. This includes strategy and operating model development, playbook design, hands-on training, simulation exercises, and building forensic readiness so teams can respond effectively when an incident occurs.&lt;/p&gt;</description></item><item><title>Career Coaching</title><link>https://sethenoka.com/career-coaching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://sethenoka.com/career-coaching/</guid><description>&lt;div class="callout callout--success" role="note" aria-label="success"&gt;
 &lt;div class="callout__icon" aria-hidden="true"&gt;&lt;svg
 class="icon"
 xmlns="http://www.w3.org/2000/svg"
 viewBox="0 0 24 24"
 width="1em"
 height="1em"
 role="img"aria-hidden="true" focusable="false"&gt;&lt;path d="M12 2C6.5 2 2 6.5 2 12S6.5 22 12 22 22 17.5 22 12 17.5 2 12 2M12 20C7.59 20 4 16.41 4 12S7.59 4 12 4 20 7.59 20 12 16.41 20 12 20M16.59 7.58L10 14.17L7.41 11.59L6 13L10 17L18 9L16.59 7.58Z"&gt;&lt;/path&gt;
&lt;/svg&gt;&lt;/div&gt;

 &lt;div class="callout__body"&gt;&lt;div class="callout__title"&gt;Book your coaching session&lt;/div&gt;&lt;div class="callout__content"&gt;
 Get tailored resume, interview, and DFIR progression guidance.
 &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt;
&lt;div class="gcal-scheduling-wrap"&gt;
 &lt;div
 id="gcal-btn-1"
 class="gcal-scheduling-btn"
 data-ga="booking-cta"
 data-gcal-url="https://calendar.google.com/calendar/appointments/schedules/AcZssZ05N_AO8WHtTCERRHfZYsbyWx24xHTiyixLksRBTuAx5xaTehB9AIlpsFzn-HzId9M0OR8SH74T?gv=true"
 data-gcal-label="Book a session"
 data-gcal-color="#F29C15"
 data-gcal-enhance="false"
 &gt;
 &lt;a class="gcal-fallback" href="https://calendar.google.com/calendar/appointments/schedules/AcZssZ05N_AO8WHtTCERRHfZYsbyWx24xHTiyixLksRBTuAx5xaTehB9AIlpsFzn-HzId9M0OR8SH74T?gv=true" target="_blank" rel="noopener noreferrer"&gt;
 Book a session
 &lt;/a&gt;
 &lt;/div&gt;
&lt;/div&gt;

&lt;hr&gt;
&lt;p&gt;In the past I’ve provided tailored mentoring for people either trying to get into cybersecurity, transitioning from another field, or recently working in security and looking to level up. For the near to medium term, I’ll be running a limited number of 30‑minute mentoring calls.&lt;/p&gt;</description></item><item><title>Cybersecurity for Small Networks</title><link>https://sethenoka.com/cybersecurity-for-small-networks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://sethenoka.com/cybersecurity-for-small-networks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Cybersecurity for Small Networks&lt;/strong&gt; is a straightforward guide to improving network security whether you’re running Linux, Windows, or macOS.
– &lt;a href="https://nostarch.com/cybersecurity-small-networks"&gt;https://nostarch.com/cybersecurity-small-networks&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;picture&gt;
 &lt;source
 type="image/webp"
 srcset="https://sethenoka.com/cybersecurity-for-small-networks/Cover_hu_f470e86a1010846c.webp 480w, https://sethenoka.com/cybersecurity-for-small-networks/Cover_hu_c969252c4268f2da.webp 960w"
 sizes="(max-width: 480px) 100vw, 480px"
 /&gt;
 &lt;img
 src="https://sethenoka.com/cybersecurity-for-small-networks/Cover_hu_321545d52dfb9e66.jpg"
 srcset="https://sethenoka.com/cybersecurity-for-small-networks/Cover_hu_321545d52dfb9e66.jpg 480w, https://sethenoka.com/cybersecurity-for-small-networks/Cover_hu_3f70c35cb35fce06.jpg 960w"
 sizes="(max-width: 480px) 100vw, 480px"
 width="480"
 height="574"
 alt="Cybersecurity for Small Networks Cover"
 class=""
 loading="lazy"
 fetchpriority="auto"
 decoding="async"
 /&gt;
&lt;/picture&gt;

&lt;p&gt;Before writing this book, I wanted to rebuild my home network so that it was more secure and easier to manage. &lt;a href="https://nostarch.com/"&gt;No Starch Press&lt;/a&gt; were kind enough to work with me to create this book which aims to lead the reader through doing just that: taking their home or other small network from zero to secure with relative ease.&lt;/p&gt;</description></item><item><title>Presentations</title><link>https://sethenoka.com/presentations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://sethenoka.com/presentations/</guid><description>&lt;p&gt;This page is a collection of past presentations, talks, webinars, and other publications. For a complete list, please find me on &lt;a href="https://www.linkedin.com/in/sethenoka/"&gt;LinkedIn&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;NB:&lt;/em&gt;&lt;/strong&gt; For various reasons, I can only make available material that was created for and presented in public forums (e.g. conferences). I won’t make private or internal sessions available here.&lt;/p&gt;
&lt;p&gt;If you’d like me to speak at your conference, corporate event, or elsewhere, please use the speaker request form at the bottom of this page.&lt;/p&gt;</description></item><item><title>Search</title><link>https://sethenoka.com/search/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://sethenoka.com/search/</guid><description/></item></channel></rss>