Ahmed BelhadjadjiHow Malware Exploits Windows Environment Variables for Stealth AttacksIntroductionOct 11Oct 11
Ahmed BelhadjadjiWindows Forensics: (8- Event Logs Analysis)We reached the eighth and final phase of Windows forensics process, all the 7 previous steps are mentioned below:Apr 11, 2023Apr 11, 2023
Ahmed BelhadjadjiWindows Forensics: (6–7 Examine Windows Files and Metadata)The Windows forensics methodology comprises of 8 phases, and we have previously covered the initial five. If you wish to explore them…Mar 27, 2023Mar 27, 2023
Ahmed BelhadjadjiWindows Forensics Challenge Walkthrough (LETSDEFEND)This is a writeup for the “Windows Forensics” letsdefend challengeMar 25, 20231Mar 25, 20231
Ahmed BelhadjadjiExamine the Cache, Cookies, and History Recorded in Web BrowsersThe Windows forensics methodology passes with 8 phases, we have discussed the first four before. If you are interested in reading about…Mar 10, 2023Mar 10, 2023
Ahmed BelhadjadjiWindows Forensic Investigation (4- Registry Analysis)PrerequisitesFeb 20, 2023Feb 20, 2023