category

DFIR

Velociraptor Process Injection Hunting: Full Investigation Enrichment
Enriching Velociraptor injection findings by cross-referencing memory images, Windows event logs, filesystem artefacts, Zeek network telemetry, and lateral movement indicators into a complete investigation narrative.
Velociraptor Process Injection Hunting: Finding Executables Not Backed by Disk
A complete walkthrough of using Velociraptor VQL to detect process injection by finding anonymous executable memory regions, PE headers loaded without disk backing, and active threads executing injected code. Includes a full reusable hunt artefact.
Credential Dumping from LSASS: What the Logs Actually Show
Most guides on LSASS credential dumping focus on the attacker side. This one focuses on what you actually see in the event logs when it happens in your environment.
Using Velociraptor for Live Response on Windows
Velociraptor is free, fast, and genuinely useful for rapid triage. A walkthrough of setting it up and collecting artefacts from a simulated compromised host.
Event ID 4688 and Why Process Auditing Matters More Than You Think
If you are not logging process creation with command line arguments enabled, you are missing a significant chunk of attacker activity.
Webshells in the Wild: How They Get Installed and How to Find Them
Webshells are among the most persistent post-exploitation tools in web-facing attacks. This covers how they get installed, the most common variants, and the filesystem, process, and network indicators that give them away.
Upgrading My Home Lab: Adding a SIEM Stack on a Budget
After running a basic VM setup for a year, how I stood up Elastic SIEM without spending money on hardware I did not need.
Amcache and Shimcache: The Artefacts Attackers Forget to Clean Up
Two Windows artefacts that consistently come up in investigations because attackers rarely think to clear them.
Windows Prefetch Files in Incident Response
Prefetch files can tell you what ran, when it ran, and sometimes from where - even after the original executable has been deleted.
My Windows DFIR Checklist for Initial Triage
After working through enough incidents and CTF challenges, a checklist that covers the things that matter most in the first 30 minutes.