Introduction

What?

Root-me Forensics challenges

Why?

Gathering evidence to understand the progress of actions carried out by an attacker on a computer or an information system.

How?