How to Intercept IP Connections in a Malware Analysis Lab
SANS Institute has presented a short tutorial with Lenny Zeltser on how to intercept IP connections in a malware analysis la…
SANS Institute has presented a short tutorial with Lenny Zeltser on how to intercept IP connections in a malware analysis la…
A JA3 hash represents the fingerprint of an SSL/TLS client application as detected via a network sensor or device, such as B…
Mari DeGrazia has published a very useful post, which will help you to learn how to find and decode malicious PowerShell scr…
Alex Maestretti has published an interesting post about userland memory acquisition and targeted analysis of memory at …
AUMFOR is a GUI based tool which can help a digital forensic investigator by performing all complex and tedious work automat…
As a continuation of the “Introduction to Memory Forensics” series, Richard Davis taking a look at Redline – a free analysis…
The vast majority of threat hunting takes place on easily visible and accessible system artifacts. These include log entries…
Here is Jason Hale’s talk from Louisville Infosec 2017 titled “Investigating Malware Using Registry Forensi…
Richard Davis has posted a fresh video discussing the CCleaner malware incident reported by Cisco’s Talos Intelligence …
Today you have a unique opportunity to get a digital copy of Practical Windows Forensics (Packt Publishing) by Aym…
Login