FaresMorcy
CtrlK
  • Whoami
  • Footprinting Labs
  • Shells & Payloads
  • Password Attacks
  • Active Directory Enumeration & Attacks
  • SOC Hackthebox Notes & Labs
  • Malicious Document Analysis - HTB Notes
  • Build Home Lab - SOC Automation
  • Home Lab (Attack & Defense Scenarios)
  • Home Lab (Active Directory Scenarios)
  • Build ELK Lab
  • CyberDefenders
  • TryHackme Rooms
  • Powershell Scripting Fundamentals
  • Practical Windows Forensics
    • Data Collection
    • Examination
    • Disk Analysis Introduction
    • User Behavior
    • Overview of disk structures, partitions and file systems
    • Finding Evidence of Deleted Files with USN Journal Analysis
    • Analyzing Evidence of Program Execution
    • Finding Evidence of Persistence Mechanisms
    • Uncover Malicious Activity with Windows Event Log Analysis
    • Windows Memory Forensic Analysis
  • Hackthebox Rooms
  • WEInnovate Training
  • TryHackme SOC 1
  • TryHackme SOC 2
Powered by GitBook
On this page

Practical Windows Forensics

Data CollectionExaminationDisk Analysis IntroductionUser Behavior Overview of disk structures, partitions and file systemsFinding Evidence of Deleted Files with USN Journal AnalysisAnalyzing Evidence of Program ExecutionFinding Evidence of Persistence MechanismsUncover Malicious Activity with Windows Event Log AnalysisWindows Memory Forensic Analysis
PreviousPowershell Scripting FundamentalsNextData Collection