Dynamic Malware Analysis with Process Monitor | TryHackMe
We covered basic dynamic malware analysis using process monitor to uncover network connections, processes spawned by the malware and…
We covered basic dynamic malware analysis using process monitor to uncover network connections, processes spawned by the malware and…
We covered Dynamic Malware Analysis using API Calls monitoring and logging using tools such as API Logger and API…
We covered dynamically analyzing malware using process explorer to discover DLLs, handles, resource consumption, network activity and to uncover…
We covered dynamic malware analysis by analyzing and comparing changes and modifications done on the registry using Regshot. This…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from log files…
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital evidence, what’s…
Introduction We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation….
In this post, we covered investigating a compromised Windows machine with WMI Backdoors. This was part of TryHackMe…
Introduction We covered how to analyze and conduct network forensic on pcap files with Brim. we also demonstrated how…
Premise In this video walkthrough, we covered Disk analysis and forensics using Autopsy. We extracted forensic artifacts about the…