Skip to main content

Dfir

MSSQL Cheat Sheet

·1598 words·8 mins· loading · loading
Microsoft SQL Server forensics and threat hunting guide covering registry paths, log locations, attack indicators, and configuration analysis for compromised SQL Server instances.

Huntress - Weaponized Velociraptor Delivers Ransomware

Investigation uncovered three distinct incidents where threat actors weaponized Velociraptor, a legitimate DFIR tool, for persistent command-and-control access. Attackers exploited SharePoint and WSUS vulnerabilities, installed Velociraptor as a Windows service communicating through Cloudflare tunnels, and deployed secondary tools including VS Code, OpenSSH, and TightVNC. One incident linked to Storm-2603 resulted in Warlock ransomware deployment.

Windows Registry Cheat Sheet

·343 words·2 mins· loading · loading
Key Windows Registry locations for persistence mechanisms, user activity traces, and IOC hunting in malware analysis and forensic investigations for DFIR professionals.

Windows Log Analysis Cheat Sheet (+ Chainsaw)

·968 words·5 mins· loading · loading
Critical Windows event IDs, logon types, and log locations for threat hunting and incident response, including Security.evtx, PowerShell logs, and Chainsaw analysis techniques.