Wooshan GamageIndicators of Compromise (IOCs)1. Introduction to Indicators of Compromise (IOCs)11h ago
Cindy (Shunxian) OuTryHackMe: Windows Forensics 1 — Detailed Write-UpWindows is one of the most widely used operating systems, so it’s likely that a significant portion of digital evidence in cybercrime…Nov 1, 2023
Rawan J9Persistence in LinuxPersistence is one of the first steps an attacker thinks of when successfully compromising a system to gain a consistent and a longer-term…4d ago4d ago
ZeusCybersecinInfoSec Write-ups5 Ways I Can Find Your Deleted Files as An Ethical Hacker!Computer Forensics for File RecoveryMay 125May 125
Sanchi PatelOf course, MFT isn’t that important.If you also think that MFT isn’t that important for a forensic investigation then probably give this one a read!Sep 14Sep 14
Wooshan GamageIndicators of Compromise (IOCs)1. Introduction to Indicators of Compromise (IOCs)11h ago
Cindy (Shunxian) OuTryHackMe: Windows Forensics 1 — Detailed Write-UpWindows is one of the most widely used operating systems, so it’s likely that a significant portion of digital evidence in cybercrime…Nov 1, 2023
Rawan J9Persistence in LinuxPersistence is one of the first steps an attacker thinks of when successfully compromising a system to gain a consistent and a longer-term…4d ago
ZeusCybersecinInfoSec Write-ups5 Ways I Can Find Your Deleted Files as An Ethical Hacker!Computer Forensics for File RecoveryMay 125
Sanchi PatelOf course, MFT isn’t that important.If you also think that MFT isn’t that important for a forensic investigation then probably give this one a read!Sep 14
WisemonkeysMd5 Collisions And The Impact On Computer ForensicsAbstract:The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to…Jun 28, 2023
WisemonkeysWeb Browser Forensics:Tools,Evidence Collection And AnalysisAbstract- A web browser is a necessary piece of software for accessing and carrying out a variety of online tasks, including email…Jun 28, 2023