13 hours ago6 minSUM UAL - Investigating Server Access with User Access LoggingLearn what the SUM UAL database is and how it can help make or break DFIR analysis.
Apr 275 minLinux Forensics - Collecting a Triage Image Using The UAC ToolLearn how to take a triage image of a *nix based system using the UAC tool.
Apr 166 minRespond and Investigate a Compromised Google Workspace UserLearn how to respond and investigate a compromised Google Workspace user.
Mar 284 minMinimizing Malicious Script ExecutionLearn some quick wins to minimize malicious script execution.