Android Reverse Engineering Basics | Part 1 | React Native Applications
We covered the first part of Android applications reverse engineering basics where we discussed file format of…
We covered the first part of Android applications reverse engineering basics where we discussed file format of…
We covered a threat hunting challenge using elastic search where we demonstrated searching and analyzing logs to…
We covered a CTF scenario where we started with nmap scanning followed by enumeration of the web…
We covered Linux authentication logs, log files locations in Linux, Linux log analysis tools available in Linux…
We covered the first part of buffer overflow training using TryHackMe Buffer Overflow room which is part…
We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine…
We covered part two of threat hunting with elastic search. We covered queries and methodologies to uncover…
We covered analyzing Windows events logs using Python-evtx and chainsaw. We started with extracting Powershell logs and…
We covered threat hunting in-depth, compared threat hunting with incident response, we covered common Linux Privilege Escalation…
We covered threat hunting in-depth, compared threat hunting with incident response, covered a MITRE-based approach to hunt…