
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
271 results found for "forensic"
- Rethinking Incident Response – From PICERL to DAIR (Expanded Edition)
If leadership doesn’t care about forensic review or court action, maybe you don’t need a full 100GB image What you learned while analyzing logs, running memory forensics, or doing packet captures — that’s what
- Incident Response Log Strategy for Linux: An Essential Guide
attackers with elevated privileges can disable or erase them, making log analysis a critical part of any forensic By following these strategies, you can mitigate the damage and gather critical forensic data that will
- What to Do After a Ransomware Attack
Memory Capture: Capture a memory image from compromised systems to analyze for forensic evidence.
- Petra Security: Reporting, Threat Hunting, Investigation tip and Final Thoughts
to hide communication threads Petra preserves these events even if they’re deleted — a huge win for forensic
- Dropzone AI Dashboard & Investigation Overview
ask me which tools I enjoy working with the most, I will always say CrowdStrike , SentinelOne , and Forensic
- Persistence: The Art of Staying Hidden
\Explorer\Shell Folders These autostart locations are often the first place incident responders and forensic When conducting a forensic investigation, it is crucial to collect all files from this directory, as
- SentinelOne(P1- Dashboard): A Practical Guide/An Practical Training
series where we’ll dive deep into how SentinelOne works, what you can expect, and how it fits into forensic
- Querying Like a Pro in Arkime: Getting the Most Out of Arkime Viewer: Beyond the Basics
This is where packet forensics turns visual, interactive, and actually fun . 🔓 “Unrolling” a Session
- Tracking Lateral Movement — Named Pipes, Scheduler, Services, Registry, and DCOM (Event IDs)
Luckily, Windows leaves behind rich forensic artifacts — if you know where to look. Even if the attacker deletes the task, the XML file may remain or be recovered forensically from disk
- Log Analysis – It’s Not About Knowing, It’s About Correlating
available now — like Hayabusa : https://www.cyberengage.org/post/hayabusa-a-powerful-log-analysis-tool-for-forensics-and-threat-hunting Captures client that disconnected 4801 Workstation Unlocked Often seen before Type 7 reconnects Key Forensic
- Streamlining Cloud Log Analysis with Free Tools: Microsoft-Extractor-Suite and Microsoft-Analyzer-Suite
This toolkit provides a convenient way to gather logs and other key information for forensic analysis
- Power of AWS: EC2, AMIs, and Secure Cloud Storage Solutions
SIFT AMI : One notable AMI available is the SANS Community SIFT VM, a preconfigured forensic image,









