SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label windows forensics. Show all posts
Showing posts with label windows forensics. Show all posts

KOVTER Malware Analysis: Unveiling Fileless Persistence via Registry Manipulation

›
The digital shadows whisper tales of compromise, of systems infiltrated not by tangible files, but by insidious whispers embedded deep ...

Investigating an Infected Machine with Splunk: A Blue Team Playbook

›
The glow of the monitor was a solitary beacon in the digital abyss. Logs, raw and unfiltered, were the whispers of compromised systems, a ...

Investigating WMI Backdoors in Windows: A Deep Dive with Loki and Yara

›
The digital shadows lengthen as another compromised system whispers secrets. You’re staring into the abyss of a Windows machine, n...

Raging Scammer FAILS to SysKey Me: A Digital Autopsy

›
The glow of the monitor was the only light in the bunker, illuminating the digital battlefield. Tonight, we weren't just watching...

Guía Definitiva para Realizar Análisis Forense de Malware en Entornos Windows

›
La luz parpadeante del monitor era la única compañía mientras los logs del servidor escupían una anomalía. Algo se movía en las sombras di...

Hoarder: Automating Forensic Artifact Collection for Incident Response

›
HOARDER Forensic Artifact Collector A breach. Lights flicker. The console drowns in a sea of cryptic lo...
›
Home
View web version
Powered by Blogger.