InTenable TechBlogbyDavid WellsLet’s Reverse Engineer DiscordHow we reverse engineered Discord’s call protocol and found it being MITM-ed by Discord.Jan 12, 20201.6K5Jan 12, 20201.6K5
Green Thrive Plants ServiceHow to take care of the Tulsi plant in the summers?Tulsi plant (Holy Basil) is one of the common plants which is available in almost all homes in India. People worship this plant. This plant…Apr 8, 2022Apr 8, 2022
InFMI Cyber Security Consulting ServicesbyDigit OktaviantoLog Analysis for Digital Forensic Investigationa. Introduction to Log AnalysisFeb 26, 2020611Feb 26, 2020611
InKatie’s Five CentsbyKatie NickelsA Cyber Threat Intelligence Self-Study Plan: Part 1There are many ways to learn. While some people prefer to have a live instructor in a course, others are great at doing self-study. I…Feb 23, 20211.3K17Feb 23, 20211.3K17
InSecurityBytesbyPeteBlue Team fundamentals Part Two: Windows Processes.In part one I touched on logging and the importance of working with what you have already got, rather than trying to reinvent the wheel…Mar 14, 20173283Mar 14, 20173283
Craig H. RowlandUsing Linux Process Environment Variables for Live ForensicsIn this post and video we’re going to explore the Linux /proc directory further by digging into a live process and the environment…May 5, 2019May 5, 2019
InInfoSec Write-upsbyDavid SchiffMemory Analysis For Beginners With Volatility - Coreflood Trojan: Part 1Welcome to my series on memory analysis with Volatility. To start off the series I want to make sure we’re all sorted out with our…Oct 2, 2020226Oct 2, 2020226
InInfoSec Write-upsbyDavid SchiffMemory Analysis For Beginners With Volatility — Coreflood Trojan: Part 2Hello everyone, welcome back to my memory analysis series. If you didn’t read the first part of the series — go back and read it here:Oct 17, 20201293Oct 17, 20201293
InPurple TeambyDavid SchiffMemory Analysis For Beginners With Volatility — Coreflood Trojan: Part 3Welcome back. In order to continue our forensic investigation of the Coreflood Trojan we need a little recap from part 2.May 23, 202134May 23, 202134
Daniel FWannacry Malware AnalysisWelcome to my first blog post where I will do basic malware analysis to wannacry ransom, I will show you the common technique of finding…Oct 2, 202157Oct 2, 202157
Nothing Cyber [NC]Blue Team: System Live Analysis [Part 1]- A Proactive Hunt!Let’s Connect | LinkedInDec 4, 2020102Dec 4, 2020102
Vikas SinghCreate a Super Timeline with TACTICAL/IREC Triage ImageLearn how to create a unified time-line of events to investigate an incident.Sep 19, 202120Sep 19, 202120
Lynnsey Graham NovakNetwork Forensic Investigation: Identifying Malware in Network TrafficBy Matthew Grant, Lynnsey Graham Novak & James Kennedy For OTU INFR 4690, Winter 2021Apr 9, 20214Apr 9, 20214
Omri RefaeliThe IR Mindset (Part 2: Practical Approach)In the first part, I went through the first half of an investigation, which is about the mindset facing an incident. This is a crucial…Sep 28, 202115Sep 28, 202115
Omri RefaeliThe IR Mindset (Part 1)A Way of Thinking Stepping Into the Incident Response World And Practical Investigation Guidelines To Tackle Security IncidentsMay 24, 202128May 24, 202128
Matt BA Journey into NTFS: Part 7For today’s post, I’m going to focus on the file $MFTMirr. This is going to be a relatively short post as this file is not the most complex…Feb 1, 201728Feb 1, 201728
Matt BA Journey into NTFS: Part 6For today’s post, I’m finally going to get to the head honcho of NTFS files: the MFT. This is without a doubt the most important NTFS…Jan 30, 201724Jan 30, 201724
Matt BA Journey into NTFS: Part 5In yesterday’s post, I spent some time discussing common NTFS attributes. Experienced DFIR analysts may have noticed that I left out three…Jan 30, 20172Jan 30, 20172