CYBER 5W

CYBER 5W

The Art of DFIR Training

Windows Shell Items Analysis

Windows Shell Items Analysis

Deep dive of what we can do with Shell Items on windows

in
Network Forensics With Wireshark

Network Forensics With Wireshark

Understanding how we can perform Forensics on network captures using Wireshark tool

in
How SIEM Works

How SIEM Works

Understanding how SIEM Works

in
CyberGate Technical Analysis

CyberGate Technical Analysis

Analysis of CyberGate RAT

in
Google Drive Forensics

Google Drive Forensics

Understanding how to forensically analyze Google Drive

in
Windows Registry Analysis

Windows Registry Analysis

understanding how Registry works in windows and how to analyze it

in
Windows Event Logs Analysis

Windows Event Logs Analysis

understanding how Event logs work in windows and how to analyze them

in
Writing YARA Rules

Writing YARA Rules

How to write a good YARA Rule

in