Trending

#LearningDFIR

Latest posts tagged with #LearningDFIR on Bluesky

Latest Top
Trending

Posts tagged #LearningDFIR

Post image

You can use the command line tool ewfverify to calculate the hash value and verify a forensic image on Linux in the EWF
format (Expert Witness Compression Format):

sudo apt install ewf-tools
ewfverify <<image_name>>

It works on single files as well as multiple part files.

#LearningDFIR #DFIR

6 1 0 0

Transferring my existing Windows forensics for IR course to Podia to finally make it online available.

#LearningDFIR #DFIR

4 0 0 1

Attackers often establish persistence or move laterally by creating services.

๐Ÿง  Check for Event ID 7045 in the System log

<<A service was installed in the system>>

#DFIR #LearningDFIR

0 0 1 0

C'mon those #LearningDFIR or interested!

#PopQuiz

0 0 0 0

The Master File Table (MFT) is a crucial component of the NTFS file system used by Windows operating systems. It functions as a central database that records information about every file and directory on an NTFS volume.

#DFIR #LearningDFIR

3 0 1 0

Windows loads applications at startup via specific registry keys.

Registry paths:
- HKCU\Software\Microsoft\Windows\CurrentVersion\Run
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run

Review for suspicious entries or executables in unusual locations.
#LearningDFIR #DFIR

4 0 1 0

Without gatekeepers, there is a single barrier to entry when it comes to #dfir and that's hardware. You NEED a beast in most instances to do the work effectively.

I am not sure if there is a way around it? Cloud isn't the answer cause that's also $$$.

Thoughts??

#LearningDFIR #HomeLabs

3 0 4 0

WMI can be abused for stealthy persistence.

๐Ÿ” Check registry:
HKLM\SOFTWARE\Microsoft\Wbem\CIMOM

Investigate:

__EventFilter

__EventConsumer

__FilterToConsumerBinding

#DFIR #LearningDFIR #ThreatHunting

2 1 1 0

NTUSER.DAT is a system file found in every user profile on a Windows system. It stores the user's Registry hive under HKEY_CURRENT_USER (HKCU).

๐Ÿง  Inside?

* Program settings
* Recent files
* User preferences
* Evidence of activity

#DFIR #LearningDFIR #WindowsForensics

3 0 1 0

What Are Shellbags?

Shellbags are Windows artefacts that track folders a user has accessed via the File Explorer. They store view settings and folder paths, even for folders that have since been deleted.

#LearningDFIR #DFIR

4 1 1 0

I realised that some of the knowledge I have stored away and tips are useful, should I keep doing the small #dfir tips each day to help people #learningdfir ?

Inspired after teaching my class at 0xCC the last few days

5 0 0 0

๐Ÿ” Want to see what USB devices were plugged into a system?

Check the Registry key:
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR

Each subkey represents a device, storing its serial number, make, and model.

#LearningDFIR #DFIR

19 3 1 0

Identify user logins using Windows Security Event Logs. These are stored in: C:\Windows\System32\winevt\Logs\Security.evtx

Watch for Event IDs that show login activity and privilege use. #LearningDFIR #DFIR

1 1 1 0