Investigating a Hacked Webserver with Ecnrypted PHP Webshell | HackTheBox Obscure
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by exploiting a…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by exploiting a…
We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part of TryHackMe…
We covered basic dynamic malware analysis using process monitor to uncover network connections, processes spawned by the malware and…
We covered Dynamic Malware Analysis using API Calls monitoring and logging using tools such as API Logger and API…
We covered dynamically analyzing malware using process explorer to discover DLLs, handles, resource consumption, network activity and to uncover…
We covered dynamic malware analysis by analyzing and comparing changes and modifications done on the registry using Regshot. This…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from log files…
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital evidence, what’s…
Introduction We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation….
In this post, we covered investigating a compromised Windows machine with WMI Backdoors. This was part of TryHackMe…