Cyber 5W

Cyber 5W

The Art of DFIR Training

Hard disk structure and analysis

Hard disk structure and analysis

Looking at how Hard disks work and how to extend their investigation

in
Analyzing Macro enabled Office Documents

Analyzing Macro enabled Office Documents

How to analyze Macro enabled Office Documents

in
Gafgyt Backdoor Analysis

Gafgyt Backdoor Analysis

Analysis of Gafgyt Backdoor

in
How to analyze JavaScript obfuscation

How to analyze JavaScript obfuscation

Analysis of some famous JS obfuscation techniques

in
Windows Memory Forensics

Windows Memory Forensics

How to hunt for anomalies in a Windows Memory Dump

in
CryptNet Ransomware Detailed Analysis

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware

in
Matanbuchus Loader Detailed Analysis

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus loader

in
NTFS Artifacts Analysis

NTFS Artifacts Analysis

A reference for NTFS file system artifacts investigation

in