Sun Jan 05 2025 Pin
1592 label.wordCount 路 10 label.readTime

How to Safely Access the Dark Web and Gather Information Securely

This guide provides essential tips on how to safely access the dark web and gather information while ensuring privacy and security

How to Safely Access the Dark Web and Gather Information Securely
Sat Oct 05 2024 Pin
960 label.wordCount 路 7 label.readTime

Malicious Document Analysis Walkthrough

This walkthrough guides you through the analysis of malicious documents using various tools and techniques.

Malicious Document Analysis Walkthrough
Mon Sep 22 2025
3004 label.wordCount 路 19 label.readTime

Mastering TCPdump: A Comprehensive Guide to Network Traffic Analysis

Learn how to use TCPdump for capturing and analyzing network traffic with practical examples and advanced filtering techniques.

Mastering TCPdump: A Comprehensive Guide to Network Traffic Analysis
Mon Apr 28 2025
3189 label.wordCount 路 19 label.readTime

SOC L1 Alert Reporting

Learn how to properly report, escalate, and communicate about high-risk SOC alerts.

SOC label.noTag
SOC L1 Alert Reporting
Sun Apr 27 2025
864 label.wordCount 路 6 label.readTime

Memory Forensics Walkthrough

Using Volatility to Perform Memory Forensics and Extract Flags

Memory Forensics Walkthrough
Fri Apr 11 2025
2568 label.wordCount 路 16 label.readTime

Forensic Analysis of an Abandoned Hacker's Laptop

In this forensic walkthrough, we dive into a real-world scenario involving an abandoned Dell CPi notebook suspected of being used for wireless hacking activities. Using a multi-part disk image, we uncover traces of hacking tools, analyze usage artifacts, and attempt to link the digital evidence to the alleged hacker known as 'Mr. Evil.' Join me as we explore how digital forensics helps trace the footsteps of a cyber intruder and piece together their digital trail

label.noCategory label.noTag
Forensic Analysis of an Abandoned Hacker's Laptop
Sat Feb 08 2025
3378 label.wordCount 路 20 label.readTime

Digital Forensics Case B4DM755

Acquire the critical skills of evidence preservation, disk imaging, and artefact analysis for use in court.

Digital Forensics Case B4DM755
Sat Feb 08 2025
1149 label.wordCount 路 8 label.readTime

Forensic

This memory dump originates from a compromised system. Perform in-depth forensics to explore its internals.

Forensic