Forensic Windows Part 2: How to Find Evidence with Amcache
Learn how to use Amcache in Windows forensics to uncover executed and deleted tools, device traces, and key metadata. Discover the limits too.
Read the postLearn how to use Amcache in Windows forensics to uncover executed and deleted tools, device traces, and key metadata. Discover the limits too.
Read the postDiscover RansomLook, the open-source aggregator for tracking ransomware groups, leak sites, trends, and Threat Intelligence data.
Read the postLearn how to self-host Vaultwarden with Docker and Traefik, secure admin access, and connect Bitwarden clients easily.
Read the postLearn how ShimCache helps uncover Windows activity traces, spot suspicious files, and kick off a fast forensic analysis.
Read the postWith this tutorial, learn how to configure Graylog’s notification system to send e-mail alerts when a specific event is detected.
Read the postIn this article, we are going to learn how to quickly and easily deploy the Wazuh open source XDR solution via Docker, to create a lab quickly.
Read the postPrivateBin is an open source alternative to PasteBin, a very useful application for securely sharing passwords and code snippets.
Read the postLearn how to install and configure Blocky on Linux, an open source network ad-blocker capable of blocking ads and malicious sites on a network.
Read the postLearn how to install and configure Rsyslog on Linux to forward logs to Graylog for efficient log indexing and management. Step-by-step guide included.
Read the postIn this tutorial, we’ll learn how to install and configure NXLog on Windows Server to send logs automatically to a Graylog server.
Read the postLearn how to install Graylog on Debian to centralize and analyze logs from your network devices efficiently. Step-by-step guide for a log management setup.
Read the postIn this tutorial, we’re going to install Apache Guacamole on a Debian server to provide a management bastion for Windows, Linux and other servers.
Read the postIntroducing and using CyberChef, a lightweight web application for encrypting, decrypting, encoding, decoding and transforming data.
Read the postLearn how to use PowerHuntShares to enumerate and inventory network file shares in an Active Directory domain for better security and visibility.
Read the post