Network Forensics with Powershell | TryHackMe Windows Network Analysis
We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine…
We covered network analysis and forensics on Windows using Powershell and CMD. We analyzed an infected machine…
Introduction We covered live forensics of a Linux workstation suspected of being infected with malware. We analyzed…
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by…
We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part…
We covered basic dynamic malware analysis using process monitor to uncover network connections, processes spawned by the…
We covered Dynamic Malware Analysis using API Calls monitoring and logging using tools such as API Logger…
We covered dynamically analyzing malware using process explorer to discover DLLs, handles, resource consumption, network activity and…
We covered dynamic malware analysis by analyzing and comparing changes and modifications done on the registry using…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from…
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital…
We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics…
In this post, we covered investigating a compromised Windows machine with WMI Backdoors. This was part…
Introduction We covered how to analyze and conduct network forensic on pcap files with Brim. we also…
In this video walkthrough, we covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about…
In this video walkthrough, we covered disk analysis with Autopsy. We performed forensic analysis on the disk…