Cyber Security Lab
IT Security & IT Forensics Examples

Web Forensics

Cache Manipulation

Load images using various techniques to avoid being cached.


Various images are loaded and displayed on the pages.

What other hidden images can be found?

How does the transfer from the server to the client look like?