cpuucpuu.hashnode.dev·Nov 5, 2023How to Perform Memory Forensic Analysis in macOS Using Volatility 3Introduction Memory forensic analysis is an intricate and challenging aspect of cybersecurity, one that becomes increasingly crucial as cyber threats evolve. In earlier discussions, I introduced the installation of Volatility 3, a cutting-edge tool i...Discuss·103 readsMemory Forensicsmemory forensics
K Willd4nsix.com·Aug 16, 2023Welcome to D4NSIXHello and Welcome to D4NSIX! Created this blog to help inform average Janes & Joes (and educate up-and-coming cyber professionals) on the world of CYBER. Long story short I have been indoctrinated into the cyber realm, helping understand the hackers ...Discuss·1 like·171 readsforensics
Sky Davispayloadgiovanni.hashnode.dev·Aug 7, 2023Betrayl - Kase Scenarios OSINT Write Up 👺🪓🩸💔Betrayl - Kase Scenarios OSINT Write Up 👺🪓🩸💔 While researching for new OSINT challenges, I stumbled upon a website called Kase Scenarios, where you have to investigate fictional cases. Kase Scenarios has a challenge for $50 called Dark Waters, wh...Discuss·11 likesOSINT
Shreya Shreeshreyashree.hashnode.dev·Jul 16, 2023My Digital Defenders Cybersecurity CTF 2023 WriteupIn this first-ever blog post, I will be sharing the writeups for some of the flags that I found as a part of the Capture the Flag (CTF) competition 2023 organized by CISCO x CNI IISC x Traboda x bi0s. I had a fun time solving these challenges. For t...Discuss·1 like·68 readsWeb Exploitation
cpuucpuu.hashnode.dev·Mar 9, 2023[Book Review] Black Hat Python, 2nd EditionJustin Seitz and Tim Arnold, "Black Hat Python, 2nd Edition", NoStarch, 2021 Introduction In an era where digital information and security have become paramount, delving into the realms of hacking and cyber defense is increasingly vital. The book "Bl...Discuss·45 readsPython
cpuucpuu.hashnode.dev·Mar 2, 2023[Book Review] PowerShell and Python Together: Targeting Digital InvestigationsChet Hosmer, "PowerShell and Python Together: Targeting Digital Investigations", Apress, 2019 Introduction "PowerShell and Python Together: Targeting Digital Investigations" by Chet Hosmer is an invaluable resource for those in the field of digital i...Discuss·85 readsPowershell
cpuucpuu.hashnode.dev·Feb 23, 2023[Book Review] Python Forensics: A Workbench for Inventing and Sharing Digital Forensic TechnologyChet Hosmer, "Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology", Syngress, 2014 Introduction Welcome, avid readers and Python enthusiasts alike, to my newest review. This time, we'll be delving into an innovative, i...Discuss·117 reads#digitalforensic
cpuucpuu.hashnode.dev·Feb 16, 2023How to Perform Memory Forensic Analysis in Linux Using Volatility 3Introduction In a prior blog entry, I presented Volatility 3 and discussed the procedure for examining Windows 11 memory. In the current post, I shall address memory forensics within the context of the Linux ecosystem. Linux Memory Dump Acquisition E...Discuss·3.9K readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Feb 9, 2023How to Perform Memory Forensic Analysis in Windows 11 Using Volatility 3Introduction I already explained the memory forensics and volatility framework in my last article. In this post, I will cover a tutorial on performing memory forensic analysis using volatility in a Windows 11 environment. Windows 11 Memory Dump Acqui...Discuss·3.9K readsMemory Forensicsmemory forensics
cpuucpuu.hashnode.dev·Jan 26, 2023An Introduction to Volatility 3 and Installation GuideIntroduction Forensic experts are frequently summoned in the aftermath of a security breach or to ascertain whether an incident has transpired. Their primary objective is to obtain a snapshot of the compromised system's RAM to capture cryptographic k...Discuss·8.7K readsMemory Forensicsmemory forensics