SavitarX
search
⌘Ctrlk
LinkedinTryHackme
SavitarX
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
      • CDSA
      • DFIR
        • Introduction to Digital Forensics
        • Investigating Windows Endpoints
          • Windows Event Logs
          • The Registry
          • Evidence of Execution
          • Persistence and Lateral Movement
          • Anatomy of NTFS
          • File Deletion and Recovery
          • LNK Files and Jump Lists
          • User Behavior Forensics
        • Investigating Windows Memory
        • Investigating Linux Devices
        • MacOS Forensics
    • Web Pentesting
  • Writeups
    • Tryhackme
    • HTB Sherlocks
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CERTIFICATIONS & noteschevron-right
  2. Blue Teamchevron-right
  3. DFIR

Investigating Windows Endpoints

Windows Event Logschevron-rightThe Registrychevron-rightEvidence of Executionchevron-rightPersistence and Lateral Movementchevron-rightAnatomy of NTFSchevron-rightFile Deletion and Recoverychevron-rightLNK Files and Jump Listschevron-rightUser Behavior Forensicschevron-right
PreviousIntroduction to Digital Forensicschevron-leftNextWindows Event Logschevron-right