DFIR Madness

DFIR Madness

  • Guidance
    • Tips for Muggles
    • Sage Advice
  • Getting Into Infosec
    • The Five Pillars (Start Here)
    • General Computing
    • Computer Networking
    • Scripting and Programming
    • Linux / MacOS
    • Windows
  • Labs
    • The Hunt
  • About
  • Shop
  • Guidance
    • Tips for Muggles
    • Sage Advice
  • Getting Into Infosec
    • The Five Pillars (Start Here)
    • General Computing
    • Computer Networking
    • Scripting and Programming
    • Linux / MacOS
    • Windows
  • Labs
    • The Hunt
  • About
  • Shop

Sharing the Thrill of the Hunt

Attribution and Threat Hunting, the Missing Steps After an Incident

Attribution and Threat Hunting

Case 001 Memory Analysis

Building a DFIR Analysis Fort

Forensic Artifacts Rundown

Forensic Artifacts Thumbprint

Case 001 – The Stolen Szechuan Sauce

The Stolen Szechuan Sauce

Answers to the Case of the Stolen Szechuan Sauce (Case001)

Investigating Shellcode Alerts without PCAPs

Investigating Shellcode Alerts

P2FUST – Adding Context to Declare Bad

Building a SIEM at Home

Building a SIEM at home

Posts pagination

Previous 1 2 3 Next
© 2025 DFIR Madness
Site designed and developed (using the Egesto theme) by Patrick Higingbotham (@HiggyWaka).