Investigation Scenario 🔎
An attacker remotely wiped an executive’s laptop at some point after accessing it.
What do you look for to investigate how the attacker accessed the system and their actions while in control of it?
Your only evidence source is a backup of the Windows registry taken just before the attacker wiped the system.