FaresMorcy
search
⌘Ctrlk
FaresMorcy
  • Whoami
  • Footprinting Labs
  • Shells & Payloads
  • Password Attacks
  • Active Directory Enumeration & Attacks
  • SOC Hackthebox Notes & Labs
  • Malicious Document Analysis - HTB Notes
  • Build Home Lab - SOC Automation
  • Home Lab (Attack & Defense Scenarios)
  • Home Lab (Active Directory Scenarios)
  • Build ELK Lab
  • CyberDefenders
  • TryHackme Rooms
  • Powershell Scripting Fundamentals
  • Practical Windows Forensics
    • Data Collection
    • Examination
    • Disk Analysis Introduction
    • User Behavior
    • Overview of disk structures, partitions and file systems
    • Finding Evidence of Deleted Files with USN Journal Analysis
    • Analyzing Evidence of Program Execution
    • Finding Evidence of Persistence Mechanisms
    • Uncover Malicious Activity with Windows Event Log Analysis
    • Windows Memory Forensic Analysis
  • Hackthebox Rooms
  • WEInnovate Training
  • TryHackme SOC 1
  • TryHackme SOC 2
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Practical Windows Forensics

Data Collectionchevron-rightExaminationchevron-rightDisk Analysis Introductionchevron-rightUser Behavior chevron-rightOverview of disk structures, partitions and file systemschevron-rightFinding Evidence of Deleted Files with USN Journal Analysischevron-rightAnalyzing Evidence of Program Executionchevron-rightFinding Evidence of Persistence Mechanismschevron-rightUncover Malicious Activity with Windows Event Log Analysischevron-rightWindows Memory Forensic Analysischevron-right
PreviousPowershell Scripting Fundamentalschevron-leftNextData Collectionchevron-right