Filter
Exclude
Time range
-
Near
Worked through Windows Event Logs on @TryHackMe. Now I can map events to actions, filter noise, and find the signals that matter. #WindowsForensics #BlueTeam #SecurityOps
2
Sysmon on @TryHackMe changed how I see Windows events. Learning to trace processes, tune configs, and connect the dots finally made forensics click. #Sysmon #BlueTeam #WindowsForensics
2
Sysinternals on @TryHackMe expanded my toolkit! Practicing with Streams for hidden data, TCPView for connections, and Autoruns for startups was genuinely useful. Windows investigations feel less intimidating now. #Sysinternals #WindowsForensics #BlueTeam
2
DFIR Galaxy Workstation is a preconfigured Windows VM for DFIR with DFIR_Toolbar and Explorer right-click tooling for artifact and disk-image analysis, inspired by SIFT. #DFIR #WindowsForensics #tool linkedin.com/posts/mahmoud-s…
🖥️ Just wrapped up @TryHackMe’s Windows Applications Forensics! ✅ Task Scheduler & Services analysis ✅ Browser history & extension forensics ✅ Office 365/cloud artifact hunting #DFIR #CyberSecurity #WindowsForensics tryhackme.com/room/windowsap… #tryhackme via @realtryhackme
⚠️ Disclaimer: For educational and authorized use only. Always perform forensic analysis in a controlled, legal environment. #WindowsForensics #DFIR #IncidentResponse #BlueTeamOps #CyberSecurity #MemoryForensics #RegistryAnalysis #SOCAnalyst #InfoSecTools #EducationOnly
2
⚠️ Disclaimer: For educational and authorized use only. Always perform forensic analysis in a controlled, legal environment. #WindowsForensics #DFIR #IncidentResponse #BlueTeamOps #CyberSecurity #MemoryForensics #RegistryAnalysis #SOCAnalyst #InfoSecTools #EducationOnly
2
Even if a shortcut sat idle on the desktop, Windows knows 👀 Just like the {F4E57C4B-2036-45F0-A9AB-443BCFE33D9F} key tracks what’s used (and what isn’t)… Let your week track effort, not just intention. 💥 Take action. 📊 Leave artifacts. #DFIR #WindowsForensics #CyberSecurity #MotivationMonday #BlueTeam #ThreatHunting
4
🖥️ Go inside the Windows OS and uncover digital traces. C5W-200 – Windows Forensics walks you through registry, event logs, and user artifacts. 💻 Real labs. Real tools. Real skills. 👉 academy.cyber5w.com/courses/… #C5W #WindowsForensics #DFIR #C5W200 #CyberTraining
2
1
Disclaimer: This content is for educational and awareness purposes only. Always conduct forensic analysis in authorized and ethical contexts. #WindowsForensics #DigitalForensics #CyberSecurityTraining #InfoSec #IncidentResponse #BlueTeam #ForensicAnalysis #EducationOnly #DFIR
1
1
6
📊 Learn How to Analyze Windows Event Logs Missed critical signs in your investigation? Master the art of reading Windows Event Logs to uncover security incidents, system activity, and user behavior. Read the blog → blog.cyber5w.com/eventlog-an… #C5W #DFIR #WindowsForensics #EventLogs
🔍 Advance your digital forensics skills with C5W-200: Windows Forensics. Explore key system artifacts, reconstruct timelines, and enhance your investigation techniques through practical, hands-on labs. 🔗academy.cyber5w.com/courses/… #C5W #DFIR #WindowsForensics #CyberSecurity
1
1
Whether you’re a student, IT admin, or beginner in DFIR: Always ask—who used this system before me? And if someone’s missing, ask why? #DigitalForensics #WindowsForensics #CyberAwareness #DFIR #Infosec
5