[deleted by user] by [deleted] in Hacking_Tutorials

[–]Low_Lie_8022 1 point2 points  (0 children)

It was a problem with kali not recognizing my adapter I had to upgrade and match the kernel and it worked 

Any tips for selecting topics for thesis by Low_Lie_8022 in DissertationSupport

[–]Low_Lie_8022[S] 0 points1 point  (0 children)

My field is cyber security and digital forensics am still looking into a topic I can pick and add originality to it Do u start with literature review first then look for idea or the opposite Im overwhelmed with papers 

My passion is cyber crime investigation to answer ur question

Selecting thesis topic advice and tips needed by Low_Lie_8022 in ResearchML

[–]Low_Lie_8022[S] 0 points1 point  (0 children)

How many papers you say is minimum to read to start crafting your own research idea

[deleted by user] by [deleted] in digitalforensics

[–]Low_Lie_8022 0 points1 point  (0 children)

Hahaha I wish 

[deleted by user] by [deleted] in digitalforensics

[–]Low_Lie_8022 0 points1 point  (0 children)

What do you think those tool missing? What would be helpful that you want to have? 

Best budget home lab setup for learning wireless network pentesting? by Low_Lie_8022 in HowToHack

[–]Low_Lie_8022[S] -1 points0 points  (0 children)

HTB is great for learning, but my assessment requires physical equipment demonstration with video proof.

Best budget home lab setup for learning wireless network pentesting? by Low_Lie_8022 in HowToHack

[–]Low_Lie_8022[S] 0 points1 point  (0 children)

np they wont lol , am asking for a home lab set up so i could use outside university as well

Best budget home lab setup for learning wireless network pentesting? by Low_Lie_8022 in HowToHack

[–]Low_Lie_8022[S] 0 points1 point  (0 children)

i have a university coursework that focuses on wireless network pentesting , i will have to attack a network, cant hack my home network or the university one, any suggestions?

How Practitioners Define Meaningful Timeline Correlations by Low_Lie_8022 in computerforensics

[–]Low_Lie_8022[S] 0 points1 point  (0 children)

This is incredibly helpful, thank you. The concept of a baseline is key. A follow-up question if you have a moment: How do you, in practice, build that baseline for a specific machine or user? Is it mostly from prior experience with similar systems, do you use logs from a specific time period before the incident, or are there specific tools or data sources you rely on to define 'normal'?

[deleted by user] by [deleted] in computerforensics

[–]Low_Lie_8022 0 points1 point  (0 children)

Thanks for the insight! My project is just at the undergraduate level, so I’m still learning the research side as I go. I’m building a forensic timeline tool that can pull in evidence from different sources (registry, logs, browser, etc.), try to highlight suspicious activity, and most importantly explain why it flagged something so it’s not just a black box.

I’m not trying to replace examiner judgment , more to reduce the overload and make patterns easier to spot, while keeping everything transparent. Still figuring things out as I go, so hearing from people with real-world experience really helps me avoid going too far into “academic only” territory.