HussainMemory Analysis: Acquisition and ToolsMemory acquisition is a crucial step in digital forensics, involving the capture and preservation of the volatile memory (RAM) of a…Jan 22Jan 22
HussainMemory Analysis: Importance and Possible ArtifactsMemory analysis, also known as memory forensics, stands as an integral aspect of the Digital Forensics and Incident Response (DFIR)…Jan 20Jan 20
HussainThreat Hunt Against Indian APT’sIndia has seen the emergence of Advanced Persistent Threat (APT) groups that have largely remained undisclosed on the global stage. These…Dec 6, 2023Dec 6, 2023
HussainTruncated Logs — Qradar ResolvedTruncated logs on QRadar due to WinCollect can occur for several reasons. Here are some possible causes.May 10, 2023May 10, 2023
HussainLinux Memory Profiling 2022— Red-hat Memory AnalysisLinux memory analysis is not that easy as it for windows, but there are ways to dump and analyze the memory which required some extent of…Sep 29, 2022Sep 29, 2022
HussainInstall Kali Linux on windows In Two StepsKali Linux is mostly used by crackers and bad guys but also used by security professionals aka White Hat Hackers .Kali linux distribution…Jan 15, 2022Jan 15, 2022
HussainInvestigate Logs File Using Linux | RegexLogs files parsing are essential for red and blue team, Extracting artifacts from such files is the key especially for any blue team…Dec 31, 2021Dec 31, 2021
HussainFinding Macro in Xls FormatThreat actors used to embed VBA macro instructions in docx ,xls ,XML ,ppt and pdf files format. According to CKC(Cyber Kill Chain),in…Nov 30, 2021Nov 30, 2021