@ 2023 Cyber Dojo. All rights reserved.
HomeBlog
Blog
Showing 1 - 10 of 12 results
Introduction In the ever-evolving field of digital forensics, the Windows Registry serves as an indispensable repository of system and user...
-
-
November 28, 2024
In digital forensics, identifying, collecting, and interpreting system artifacts is crucial for uncovering the truth behind user activity. Whether you’re...
-
-
November 18, 2024
In today’s advanced threat landscape, Detection as Code stands out as a game-changing approach. By treating detection logic as code,...
-
-
November 16, 2024
APT34, also known as OilRig, is a well-organized and persistent Iranian cyber espionage group that has been actively targeting organizations...
-
-
November 9, 2024
When tasked with investigating potential data exfiltration by a former employee, I knew the process would involve meticulously examining digital...
-
-
November 5, 2024
Introduction In today’s threat landscape, security incidents are a certainty, and every organization must be prepared to defend its critical...
-
-
November 3, 2024
Becoming a professional Tier 2 SOC analyst in Digital Forensics and Incident Response (DFIR) demands a comprehensive set of skills...
-
-
November 2, 2024
Main project by Mayfly: https://github.com/Orange-Cyberdefense/GOAD This was fully tested only on a Windows 10 machine with 64GB of RAM. This may...
-
-
September 17, 2024
DCShadow is an advanced feature of the Mimikatz tool, specifically found in the lsadump module. This powerful attack simulates the...
-
-
September 15, 2024
What are LolBins? “LolBins” or Living of the Land Binaries, is a term used to describe the exploitation of legitimate operating...
-
-
June 2, 2024
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s GSEC Preparation (SEC401)Â course. This course delves into the fundamental principles of computer and information security,...-
78 Lessons
-