CYBER 5W

CYBER 5W

The Art of DFIR Training

Writing YARA Rules

Writing YARA Rules

How to write a good YARA Rule

in
 Email Forensics

 Email Forensics

Looking at how you can perform an investigation and detect malicious Emails

in
 Unpacking Malware Manually

 Unpacking Malware Manually

A Walkthrough of one of the most used unpacking techniques

in
Hard disk structure and analysis

Hard disk structure and analysis

Looking at how Hard disks work and how to extend their investigation

in
Analyzing Macro enabled Office Documents

Analyzing Macro enabled Office Documents

Learn how to analyze MS Office Macro enabled Documents, a step-by-step guide to identifying and reversing malicious macros, and how to use olevba and cyberchef to decode and analyze the macro code. Analyzing Macro enabled Office Documents, a comprehensive guide to malware analysis, reverse engineering, and forensic investigations.

in
Gafgyt Backdoor Analysis

Gafgyt Backdoor Analysis

Analysis of Gafgyt Backdoor

in
How to analyze JavaScript obfuscation

How to analyze JavaScript obfuscation

Analysis of some famous JS obfuscation techniques

in
Windows Memory Forensics

Windows Memory Forensics

How to hunt for anomalies in a Windows Memory Dump

in