This document summarizes network forensics techniques for tracking hackers. It discusses common motivations for cyber attacks such as entertainment, fame, fraud, or monetary gain. The main types of attacks are loss of confidentiality, integrity, and availability. To protect victims, the document recommends moving target defense which copies and moves data across servers to avoid attacks. It notes the balance between security and accessibility, and provides resources on SSH keys and operating systems. User mistakes are identified as a major cause of security breaches, so strong passwords and account monitoring are advised.