Regarding to this challenge, here are the tasks should be completed for the first one. And we will be cover digital forensic in web log and memory file. In figure 1, I’ve already downloaded and extracted the two files, so lets start ! 1. What type of attacks has been…