top of page

Please access this website using a laptop / desktop or tablet for the best experience


How Attackers Use Search Engines and What You Can Do About It
Search engines are incredible tools for finding information online, but they can also be used by attackers for reconnaissance. How...
-
Nov 14, 20242 min read


Cloud Incident Response: How to Acquire and Analyze a VM Disk Image in Azure
When conducting incident response in the cloud, there often comes a point when logs alone aren’t enough, and we need direct access to...
-
Nov 10, 20244 min read


Azure(Virtual Machine Logs) : A Guide for IR
Lets talk about Fifth category called: Virtual Machine Logs Azure provides a range of logging options for virtual machines (VMs ) to...
-
Nov 8, 20243 min read


Azure(NSG/Storage Account Logs) : A Guide for IR
Lets Talk about Third category called: Resource Azure offers a variety of logging resources to support incident response, monitoring, and...
-
Nov 8, 20246 min read


Azure(Tenant/Subscription Logs) : A Guide for Incident Response
While the Log Analytics Workspace is an excellent tool for monitoring and analyzing logs in Azure, storing logs in a Storage Account...
-
Nov 7, 20247 min read


Azure(Tenant Logs) : A Guide for IR
In cloud-based environments like Azure, maintaining comprehensive visibility over all activities is essential for securing your...
-
Nov 5, 20247 min read


Understanding VM Types and Azure Network for IR
Microsoft Azure provides a wide range of compute services, organized based on workload types and categorized as Infrastructure as a...
-
Nov 4, 20245 min read


Azure Resource Groups and Role-Based Access Control: A Guide for IR
Microsoft Azure is a vast ecosystem of cloud-based services and tools, offering almost limitless possibilities for building, managing,...
-
Nov 3, 202411 min read


"Step-by-Step Guide to Uncovering Threats with Volatility: A Beginner’s Memory Forensics Walkthrough"
Alright, let’s dive into a straightforward guide to memory analysis using Volatility. Memory forensics is a vast field, but I’ll take you...
-
Nov 1, 20247 min read


MemProcFS/MemProcFS Analyzer: Comprehensive Analysis Guide
MemProcFS is a powerful memory forensics tool that allows forensic investigators to mount raw memory images as a virtual file system ....
-
Oct 31, 20245 min read


Memory Forensics Using Strings and Bstrings: A Comprehensive Guide
Memory forensics involves extracting and analyzing data from a computer's volatile memory (RAM) to identify potential Indicators of...
-
Oct 30, 20244 min read


Fileless Malware || LOLBAS || LOLBAS Hunting Using Prefetch, Event Logs, and Sysmon
Fileless malware refers to malicious software that does not rely on traditional executable files on the filesystem , but it is important...
-
Oct 28, 20248 min read


Leveraging Automation in AWS for Digital Forensics and Incident Response
For those of us working in digital forensics and incident response (DFIR) , keeping up with the cloud revolution can feel overwhelming...
-
Oct 26, 20245 min read


Optimizing AWS Cloud Incident Response with Flow Logs, Traffic Mirroring, and Automated Forensics
When it comes to managing networks—whether on-premise or in the cloud—one of the biggest challenges is understanding what’s happening...
-
Oct 25, 20247 min read


AWS Security Incident Response Guide: A Dive into CloudWatch, GuardDuty, and Amazon Detective
AWS’s very own Security Incident Response Guide . While I’ll cover some of the main highlights here, it’s worth taking a full look...
-
Oct 24, 20246 min read


Power of AWS: EC2, AMIs, and Secure Cloud Storage Solutions
AWS Regions and API Endpoints Amazon Web Services (AWS) is a cloud platform offering a vast array of services that can be accessed and...
-
Oct 23, 20245 min read


AWS: Understanding Accounts, Roles,Secure Access and AWS Instance Metadata Service (IMDS) and the Capital One Breach
Amazon Web Services (AWS) has grown into a powerful platform used by businesses around the world to manage their data, infrastructure,...
-
Oct 22, 20248 min read


Cloud Services: Understanding Data Exfiltration and Investigation Techniques
In today’s cybercrime landscape, attackers are increasingly turning to cloud services for data exfiltration. While this presents...
-
Oct 21, 20245 min read


Microsoft 365 Security: Understanding Built-in Detection Mechanisms and Investigating Log Events
As the landscape of cybersecurity threats evolves, protecting sensitive information stored within enterprise platforms like Microsoft 365...
-
Oct 19, 20245 min read


Streamlining Cloud Log Analysis with Free Tools: Microsoft-Extractor-Suite and Microsoft-Analyzer-Suite
When it comes to investigating cloud environments, having the right tools can save a lot of time and effort. Today, I’ll introduce two...
-
Oct 18, 20245 min read
bottom of page