Glossary/Roadmap

Welcome

  • Introduction

  • Glossary

  • Introduction to Incident Response

  • Six Step Incident Response Process

  • Inclusion vs Exclusion Analysis

  • Introduction to a SOC Analyst

  • MITRE Attack Framework

  • Pivoting

  • Report Writing

    • Analysis Examples

  • Resources

Windows DFIR

  • Windows Quick Tips

    • Windows Command Line

    • Windows Locations - Workstations

    • Windows Locations - Servers

  • Application Execution

    • Prefetch

    • Windows Event Log

  • File and Folder Opening

  • Deleted Items and File existence

  • Browser Activity

  • System Information

  • Cloud Storage

  • Network Actitivty and Physical Location

  • Account Usage

  • External Device/USB usage

  • Shadow Copies

  • WMI Event Consumers

  • Windows Services

  • Cached Credentials

  • Named Pipes

  • Scheduled Tasks

  • Windows Registry

  • Auto Start Entry Points

  • MITRE ATTACK

Linux DFIR

Last updated