The Pyramid of pain Explained | Threat Hunting | TryHackMe
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the…
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the…
This post provides an introduction to DFIR (Digital Forensics and Incident Response) and covers its definition, process,…
We covered cyber incident analysis with ELK Kibana or Elastic Search. We covered http logs pulled from…
We have explained the process of threat modeling and the related steps including scope definition, asset identification,…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from…
We covered configuring snort as an IDS/IPS open-source solution. Snort operates as sniffer, packet logger and IPS/IDS….
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital…
Introduction to Splunk We covered the basic fundamentals of Splunk for beginners. We explored data collection through…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically…
Introduction We covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs…
We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics…
Introduction We covered how to analyze and conduct network forensic on pcap files with Brim. we also…
Introduction to Sysinternals Tools for Malware Analysis We start by introducing the Sysinternals Suite,originally developed by Microsoft…
Introduction In this video walk-through, we covered managing logs in windows using event viewer, Powershell and windows…
Introduction This post on Threat Hunting with Sysmon in Security Operations on TryHackMe explains using Sysmon, a…
Introduction In this video walkthrough, we demonstrated incident response and investigation using osquery on Windows and Linux…
In this video walkthrough, we covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about…
Introduction The video is a tutorial on using YARA for threat detection within a cybersecurity context, specifically…