Amadey – APT-C-36 Memory Dump Analysis
Scenario An after-hours alert from the Endpoint Detection and Response (EDR) system flags suspicious activity on a Windows workstation. The […]
Amadey – APT-C-36 Memory Dump Analysis Read More »
Scenario An after-hours alert from the Endpoint Detection and Response (EDR) system flags suspicious activity on a Windows workstation. The […]
Amadey – APT-C-36 Memory Dump Analysis Read More »
Introduction In this lab, we delve into a simulated network security incident involving poisoned credentials, where attackers exploit vulnerabilities in Link-Local
Poisoned Credentials Lab Read More »
Scenario You have been sent a phishing link – It is your task to investigate this website and find out
Phishing Analysis Lab 2 Read More »
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the
Venom Lab: Investigating Compromised Ubuntu Server Read More »
Scenario The Account Executive contacted the Security Operations Center (SOC), reporting an inability to access files on their computer and
Digital Forensics – Memory Analysis Project: Investigating Ransomware Read More »
Overview As part of a simulated cybersecurity investigation, I worked on analyzing and mitigating a complex cyber attack targeting Haunted
Haunted : Threat Intelligence Analysis Read More »