DFIR Journey — Timeline
This timeline tracks my DFIR Journey from foundations → labs → tools.
Entries are ordered oldest to newest so you can follow the arc as it actually unfolded.
2025
Before October 2025 — Foundations & Direction
- Spent years as a tinkerer: home labs, break/fix, and tech troubleshooting.
- Completed B.S. in Cybersecurity (CTU) and started M.S. in Cybersecurity & Information Assurance (WGU).
- Decided to focus on Digital Forensics & Incident Response (DFIR) and SOC-style analysis as the primary career lane.
- Began building a personal brand around this path under the umbrella of “DFIR Journey.”
Early October 2025 — HTB “Windows Event Logs & Finding Evil”
- Worked through a Hack The Box module on Windows Event Logs & Finding Evil.
- Learned how painful it is to manually read EVTX at scale and how powerful Chainsaw + Sigma can be.
- Seed idea formed: “What if an AI co-pilot could help narrate these detections like a human analyst?”
- This was the spark that eventually became ForenSynth AI.
2025-10-22 — Random DFIR Noise Simulator (POC)
- Built a Random DFIR Noise Simulator PowerShell script to generate:
- Safe but realistic Windows process, logon, and file activity.
- Repeatable patterns to test detections and summarization.
- Purpose:
- Create controlled “fake evil” for tuning log workflows.
- Avoid using real malware while still exercising DFIR muscles.
- Logged artifacts and early output as part of the DFIR Journey lab archive.
2025-10-24 — ForenSynth AI v2.3.3 (Visual Refresh)
- Shipped ForenSynth AI v2.3.3, a DFIR report generator that:
- Consumes Chainsaw JSON output from Sigma hunts.
- Uses OpenAI (gpt-5-mini + gpt-5) to generate structured summaries:
- Executive narrative
- TTP/ATT&CK mapping
- Recommendations & quick wins
- Added the first visual HTML report elements:
- Event heatmap over time.
- Donut charts by attack phase.
- Ran it against multi-day EVTX logs and captured screenshots + reports for GitHub and the DFIR Journey site.
2025-10-25 — Sampling & Micro-Governor (POC)
- Faced real-world constraint: some hunts produced 2K–3K+ detections, which made summarization:
- Expensive
- Slow
- Operationally unrealistic for everyday use
- Implemented post-hunt sampling:
--limit-detectionsand--sample-stepto down-select detections (e.g., 2705 → 902).- Preserved representative coverage instead of blindly summarizing everything.
- Introduced the idea of a “micro-governor”:
- Controls how many micro-summaries are sent to the model.
- Keeps runtime and cost bounded while still producing a coherent executive report.
- Validated that ForenSynth AI can still tell a strong story with sampled detections, not just full sets.
2025-11-02 — ForenSynth AI v2.3.4 Polish Run
- Released v2.3.4 (Polish) with multiple quality-of-life and “consultancy polish” upgrades:
- HTML report refinements:
- Donut charts relabeled with MITRE-style phases (Execution, Persistence, Lateral, Defense Evasion, Unmapped/Multiple).
- Clearer legends with counts + percentages.
- Heatmap caption and Event ID footnote so readers understand what they’re seeing.
- Evidence Appendix:
- CSV export of key evidence (
--export-evidence-csv). - Easier to pivot into SIEM, spreadsheets, or ticketing systems.
- CSV export of key evidence (
- Cost realism:
- Switched from estimated token costs to actual billing usage via
resp.usage. - Aligned local cost display with OpenAI dashboard numbers.
- Switched from estimated token costs to actual billing usage via
- HTML report refinements:
- Captured a full polish run and published artifacts:
- Markdown report
- HTML report
- Evidence CSV
detections.json
- Integrated this run into:
- ForenSynth AI GitHub (
examples/2025-11-2-polish-run) - DFIR Journey site with a live HTML report link under
/forensynth/2025-11-02-polish-run/.
- ForenSynth AI GitHub (