Open in app

Sign in

Write

Sign in

Cyber Meisam [CM]
Cyber Meisam [CM]

920 Followers

Home

About

Jul 7, 2021

Blue Team-System Live Analysis [Part 11]- Windows: User Account Forensics- NTUSER.DAT Rules, Tools, Structure, and Dirty Hives!

Let’s Connect | LinkedIn | Twitter Without a doubt, the Windows registry is one of the most valuable forensics data sources that investigators can use. I should think of a dedicated series on Windows Registry Forensics, but, for now, we only focus on NTUSER.DAT …

Blue Team

7 min read

Blue Team-System Live Analysis [Part 11]- Windows: User Account Forensics- NTUSER.DAT
Blue Team-System Live Analysis [Part 11]- Windows: User Account Forensics- NTUSER.DAT
Blue Team

7 min read


Jun 2, 2021

Blue Team-System Live Analysis [Part 10]- Windows: User Account Forensics- In-use and Locked Files Acquisition

Let’s Connect | LinkedIn | Twitter One of the main challenges in live forensics is to deal with in-use or locked files and resources. Unlike the traditional forensics investigation, we are not making a full forensics image of the hard disk during system live analysis. In fact, we are interacting…

Blue Team

6 min read

Blue Team-System Live Analysis [Part 10]- Windows: User Account Forensics- In-use and Locked Files…
Blue Team-System Live Analysis [Part 10]- Windows: User Account Forensics- In-use and Locked Files…
Blue Team

6 min read


Apr 26, 2021

Blue Team-System Live Analysis [Part 9]- Windows: User Account Forensics- Ownership: Process, Applications, Folders, and Files

Let’s Connect | LinkedIn | Twitter So far, we have discussed user account creation, deletion, privileges, and associated folders and settings such as users profile and AppData folders, and user-specific environment variables. The above information is essential for an investigator to identify the existing and deleted user accounts. …

Cybersecurity

7 min read

Blue Team-System Live Analysis [Part 9]- Windows: User Account Forensics- Ownership: Process…
Blue Team-System Live Analysis [Part 9]- Windows: User Account Forensics- Ownership: Process…
Cybersecurity

7 min read


Apr 7, 2021

Blue Team-System Live Analysis [Part 8]- Windows: User Account Forensics- Profile Folder, AppData, and Environment Variables

Let’s Connect | LinkedIn | Twitter As discussed in part 6, the user account forensics roadmap consists of three phases: Data collection and validation, User categorization and profiling, and Deep-dive analysis. The deep-dive analysis phase focuses on detailed analysis of user settings and behaviours to obtain information about: This part…

Cybersecurity

5 min read

Blue Team-System Live Analysis [Part 8]- Windows: User Account Forensics- Profile Folder, AppData…
Blue Team-System Live Analysis [Part 8]- Windows: User Account Forensics- Profile Folder, AppData…
Cybersecurity

5 min read


Mar 18, 2021

Blue Team-System Live Analysis [Part 7]- Windows: User Account Forensics- Categorization and Profiling

Let’s Connect | LinkedIn | Twitter Here we are with the second phase of windows user accounts live forensics to categorize the local user accounts in a windows test system and profile them into four categories as follows: Valid Users with Valid Groups and permissions Valid Users with odd groups…

Cybersecurity

7 min read

Blue Team-System Live Analysis [Part 7]- Windows: User Account Forensics- Categorization and…
Blue Team-System Live Analysis [Part 7]- Windows: User Account Forensics- Categorization and…
Cybersecurity

7 min read


Mar 8, 2021

Blue Team-System Live Analysis [Part 6]- Windows: User Account Forensics-Road Map

Let’s Connect | LinkedIn | Twitter In part 5, I have shared few techniques to retrieve information related to user accounts, their groups, and privileges. Digital forensics and incident response are not about obtaining the data only. …

Cybersecurity

5 min read

Blue Team-System Live Analysis [Part 6]- Windows: User Account Forensics -Road Map
Blue Team-System Live Analysis [Part 6]- Windows: User Account Forensics -Road Map
Cybersecurity

5 min read


Feb 10, 2021

Blue Team-System Live Analysis [Part 5]- Windows: Users, Groups, and Privileges

Let’s Connect | LinkedIn | Twitter Have you enjoyed reading the previous parts? The needs for system live analysis, rules, and some required tools, the checklist to carry out Windows live investigation, and how to retrieve the system information and configuration. This part will discuss one of the most exciting…

Cybersecurity

7 min read

Blue Team-System Live Analysis [Part 5]- Windows: Users, Groups, and Privileges
Blue Team-System Live Analysis [Part 5]- Windows: Users, Groups, and Privileges
Cybersecurity

7 min read


Jan 18, 2021

Blue Team-System Live Analysis [Part 4]- Windows: System Information and Configurations

Let’s Connect | LinkedIn | Twitter I have discussed the need for system live analysis, rules, and some required tools, and the checklist to carry out Windows live investigation in the previous parts. Let's dive into technical aspects from this part onwards. As illustrated in the checklist, identifying system information…

Cybersecurity

7 min read

Blue Team-System Live Analysis [Part 4]- Windows: System Information and Configurations
Blue Team-System Live Analysis [Part 4]- Windows: System Information and Configurations
Cybersecurity

7 min read


Dec 21, 2020

Blue Team-System Live Analysis [Part 3]- Windows: Technical Checklist

Let’s Connect | LinkedIn | Twitter In part one, I have discussed the differences between dead-box and live box analysis and why the system live analysis is an offer we can’t refuse! Besides, I explained the role of Ioc and IoA for an investigation. Part two covers the rules and…

Cybersecurity

4 min read

Blue Team-System Live Analysis [Part 3]- Windows: Technical Checklist
Blue Team-System Live Analysis [Part 3]- Windows: Technical Checklist
Cybersecurity

4 min read


Dec 8, 2020

Blue Team: System Live Analysis [Part 2]- Windows: Rules and Tools

Let’s Connect | LinkedIn | Twitter Hope you enjoy reading part one of this series: Part 1: Blue Team: System Live Analysis - A Proactive Hunt!. Part two will cover some rules and tools that can be employed to conduct live forensics analysis on the Windows platform. …

Cybersecurity

3 min read

Blue Team: System Live Analysis [Part 2]- Windows: Rules and Tools
Blue Team: System Live Analysis [Part 2]- Windows: Rules and Tools
Cybersecurity

3 min read

Cyber Meisam [CM]

Cyber Meisam [CM]

920 Followers

by Meisam Eslahi

Following
  • ZeusCybersec

    ZeusCybersec

  • Andrew Long

    Andrew Long

  • PentesterLab

    PentesterLab

  • fa li

    fa li

  • Shubham Srivastava

    Shubham Srivastava

See all (30)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams