filmov
tv
Understanding Windows Event Logs | Digital Forensics Case Study| Windows Event Forensics- Part2

Показать описание
Let's Clear our understanding for windows event logs with a Digital Forensics Case Study. Since we have now learned the basics of windows event logs and learned how to repair the corrupted logs and analyze them using LogParser 2.2, it is time to analyze the logs in depth with a Forensics Case Study.
-------------------------------------------------------------------------------------------------------------------------
📝
Request you you to watch the full episode to clear the full flow of investigation!!
🔥
Details of the Case Study-
1. User account creation Alert on CJ Endpoint.
2. Sam couldn’t identify the details of which account got created since those details are masked.
3. Same called the user to identify if there is any stored sensitive data on his/her machine. Grabbed one PWD protected ZIP file.
4. Sam can’t take a full machine dump.
5. Sam collected the Windows Event Logs from the system (Application, Security, System) and Registry Dump.
Now we are being a Forensic Investigator, we need to identify what went wrong and how did it happen!
🙏
***If you enjoy this video, please consider Subscribing to my channel and share this to your community as well*** 🙏
🔥
🔗
Links for your Need-
-------------------------------------------------------------------------------------------------------------------------
⏭
What's next in BlackPerl?
-------------------------------------------------------------------------------------------------------------------------
In the next episode, we will come up with more such tools and techniques for DFIR and will try to explain them with real life usecases.
Also, if you want us to cover any particular topic, please let us know in the comment section below.
📞📲
We are socially active as well-
-----------------------------------------------------------------------------------------------------------------------
Twitter: @blackperl_dfir
⌚
Timelines
-------------------------------------------------------------------------------------------------------------------------
0:00 ⏩ Intro
1:34 ⏩ Case Study Details
4:51 ⏩ Demo
41:00 ⏩ Summarize
-------------------------------------------------------------------------------------------------------------------------
Thanks for watching!! Be CyberAware!! 🤞
-------------------------------------------------------------------------------------------------------------------------
📝
Request you you to watch the full episode to clear the full flow of investigation!!
🔥
Details of the Case Study-
1. User account creation Alert on CJ Endpoint.
2. Sam couldn’t identify the details of which account got created since those details are masked.
3. Same called the user to identify if there is any stored sensitive data on his/her machine. Grabbed one PWD protected ZIP file.
4. Sam can’t take a full machine dump.
5. Sam collected the Windows Event Logs from the system (Application, Security, System) and Registry Dump.
Now we are being a Forensic Investigator, we need to identify what went wrong and how did it happen!
🙏
***If you enjoy this video, please consider Subscribing to my channel and share this to your community as well*** 🙏
🔥
🔗
Links for your Need-
-------------------------------------------------------------------------------------------------------------------------
⏭
What's next in BlackPerl?
-------------------------------------------------------------------------------------------------------------------------
In the next episode, we will come up with more such tools and techniques for DFIR and will try to explain them with real life usecases.
Also, if you want us to cover any particular topic, please let us know in the comment section below.
📞📲
We are socially active as well-
-----------------------------------------------------------------------------------------------------------------------
Twitter: @blackperl_dfir
⌚
Timelines
-------------------------------------------------------------------------------------------------------------------------
0:00 ⏩ Intro
1:34 ⏩ Case Study Details
4:51 ⏩ Demo
41:00 ⏩ Summarize
-------------------------------------------------------------------------------------------------------------------------
Thanks for watching!! Be CyberAware!! 🤞
Комментарии