Reader small image

You're reading from  Windows Forensics Analyst Field Guide

Product typeBook
Published inOct 2023
PublisherPackt
ISBN-139781803248479
Edition1st Edition
Concepts
Right arrow
Author (1)
Muhiballah Mohammed
Muhiballah Mohammed
author image
Muhiballah Mohammed

Muhiballah Mohammed is a cybersecurity expert and enthusiast, experienced in security operations centers, digital forensics, and incident response. With 10 years of experience, he has worked in a variety of roles in the cybersecurity field, including SOC analyst, consultant, and forensic investigator, and has helped build multiple entities' SOC and DFIR teams. He has experience in investigating a wide range of cyber incidents. Muhiballah is passionate about providing help to organizations so that they can protect themselves against cyber threats, and he is also a mentor and teacher to new students in the cybersecurity field. He loves sharing his knowledge and experience with others, and he is always looking for new ways to help people learn about cybersecurity.
Read more about Muhiballah Mohammed

Right arrow

Exploring a real-world scenario of identifying the root cause

The cybersecurity team reported an alert triggered on hostname (DESKTOP-T7HCR2I) for a malicious hacking tool, and during the investigation, the team could not identify the root cause. As digital forensic examiners, we are now tasked with identifying the source of the malicious binary and reporting back to the cybersecurity team.

One of the things we check during such an incident is what log source types we have and how we can find our evidence to map it for the current incident. Since we are focusing on Windows artifacts, we need a way to pull the triage image over the network or we can perform that locally. In the real world, usually, we use tools such as endpoint detection and response to access the endpoint directly and collect the desired artifacts. However, in our lab scenario, we will perform manual collection using KAPE, as we covered it in Chapter 2.

By running the following KAPE script, we will collect our...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Windows Forensics Analyst Field Guide
Published in: Oct 2023Publisher: PacktISBN-13: 9781803248479

Author (1)

author image
Muhiballah Mohammed

Muhiballah Mohammed is a cybersecurity expert and enthusiast, experienced in security operations centers, digital forensics, and incident response. With 10 years of experience, he has worked in a variety of roles in the cybersecurity field, including SOC analyst, consultant, and forensic investigator, and has helped build multiple entities' SOC and DFIR teams. He has experience in investigating a wide range of cyber incidents. Muhiballah is passionate about providing help to organizations so that they can protect themselves against cyber threats, and he is also a mentor and teacher to new students in the cybersecurity field. He loves sharing his knowledge and experience with others, and he is always looking for new ways to help people learn about cybersecurity.
Read more about Muhiballah Mohammed