— Sloth Boss
When a security incident occurs, investigators are faced with a mountain of data from different sources: system logs, file timestamps, browser history, network traffic, and more. How do they make sense of it all? The answer is timeline analysis. This is the process of collecting all timestamped events from every possible source and arranging them in chronological order. This "super timeline" allows an investigator to reconstruct the entire sequence of events, from the attacker's first entry to their final action.