Scogin Security Development
search
⌘Ctrlk
Scogin Security Development
  • Welcome!
  • Collaborators
    • Meet the Team!
  • Cortex Xsoar-(Demisto)
    • Getting Started
  • AWS
    • Page 1
  • GCP
    • Certification Tracks
    • Page
  • Offensive Security Tips and Tricks
    • Footprinting
    • Network Enumeration with Nmap
  • K8s
    • CKAD Training
    • CKS Training
    • EKS Cluster Games
  • Defensive Security Tips and Tricks
    • Log Analysis Tooling
    • Windows
      • Forensics
        • THM Cheat Sheet - Windows Registry
        • Windows Registry
        • Data Acquisition
        • System Information and System Accounts
        • Files and Folders
        • Executions
        • External Devices/USB device forensics
        • Deleted Files and Data Recovery
        • Windows Prefetch files
        • File and Folder knowledge
      • Core Windows Processes
      • SysInternals
      • Event Logs
      • Sysmon
      • File Systems
    • Endpoint Tools
    • Linux
    • Forensics Tooling
  • LetsDefend
    • Incident Response Learning Path
  • pwnedlabs-io
    • Identify the AWS Account ID from a Public S3 Bucket
  • TryHackMe
    • ItsyBitsy
    • Incident Handling with Splunk
  • Hack The Box
    • Incident Handling Process
    • Security Monitoring & SIEM Fundamentals
    • Windows Event Logs & Finding Evil
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Defensive Security Tips and Trickschevron-right
  2. Windows

Forensics

THM Cheat Sheet - Windows Registrychevron-rightWindows Registrychevron-rightData Acquisitionchevron-rightSystem Information and System Accountschevron-rightFiles and Folderschevron-rightExecutionschevron-rightExternal Devices/USB device forensicschevron-rightDeleted Files and Data Recoverychevron-rightWindows Prefetch fileschevron-rightFile and Folder knowledgechevron-right
PreviousWindowschevron-leftNextTHM Cheat Sheet - Windows Registrychevron-right