Part 6-(WMI): Hunting Down Malicious WMI Activity
Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
Part 4-(WMI): The Intricacies of MOF Files: A Gateway for Malicious Infiltration in WMI
Part 3-(WMI): Understanding WMI Event Consumers in Cybersecurity
Part 2 -(WMI) :Detecting WMI-Based Attacks
Part 1 - (WMI): A Dive in its Capabilities and Stealthy Persistence Techniques
Power of Kansa: A Comprehensive Guide to Incident Response and Threat Hunting
Single-line PowerShell commands for analysis
Incident Handlers Checklist and Personalize Windows investigation Cheat Sheet
Incident Response Framework Post-Incident Phase
Incident Response Framework Recovery Phase
Incident Response Framework Eradication Phase
Incident Response Framework Containment Phase
Incident Response Framework: Detection Phase
Incident Response Framework: Preparation Phase
Incident Response Framework
Welcoming the New Year with Hope and Joy
Celebrate the Holiday Season with Joy and Gratitude
Understanding Lateral Movement in Cyber Attacks:
Unveiling the Threat of Golden Ticket Attacks