Analyzing Malicious Microsoft Office Word Document | HackTheBox Emo
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by…
We covered basic and essential concepts and tools in Digital Forensics and Incident Response. This was part…
We covered basic dynamic malware analysis using process monitor to uncover network connections, processes spawned by the…
We covered Dynamic Malware Analysis using API Calls monitoring and logging using tools such as API Logger…
We covered dynamically analyzing malware using process explorer to discover DLLs, handles, resource consumption, network activity and…
We covered dynamic malware analysis by analyzing and comparing changes and modifications done on the registry using…
We covered using Linux forensics to investigate a cyber incident. We covered reading and extracting evidence from…
Introduction We covered an introduction to digital forensics. We talked about what is considered as a digital…
Introduction We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for…