label.categoryPage - tryhackme
Sun Apr 27 2025
864 label.wordCount 路 6 label.readTime
Memory Forensics Walkthrough
Using Volatility to Perform Memory Forensics and Extract Flags

Sat Feb 08 2025
3378 label.wordCount 路 20 label.readTime
Digital Forensics Case B4DM755
Acquire the critical skills of evidence preservation, disk imaging, and artefact analysis for use in court.

Sat Feb 01 2025
938 label.wordCount 路 6 label.readTime
Conti
An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.

Sat Feb 01 2025
976 label.wordCount 路 7 label.readTime
REvil Corp
You are involved in an incident response engagement and need to analyze an infected host using Redline

Sun Sep 22 2024
5186 label.wordCount 路 30 label.readTime
Firewall Fundamentals
Explore and master the Linux iptables firewall and its utilities for managing network traffic and enhancing security on Linux systems.

Sun Sep 22 2024
1994 label.wordCount 路 13 label.readTime
Legal Considerations in DFIR
Understand the processes involved in DFIR and the legal considerations that guide them.

Sun Sep 22 2024
4498 label.wordCount 路 27 label.readTime
Networking Concepts
Learn about the ISO OSI model and the TCP/IP protocol suite.
