 
        
        
      
    
    Digital Forensics
Windows Forensics
credit to: https://frsecure.com/blog/windows-forensics-execution/
- Files a user has recently accessed - C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent 
- Registry Hives - HKCU\<User SID>\Software\Microsoft\Windows\CurrentVersion\ - Explorer\ - RecentDocs – Stores several keys that can be used to determine what files were accessed by an account. The MRUListEx key shows the order in which files were accessed. 
- TypedPaths – Shows items typed into the Windows Explorer bar by the user. 
- RunMRU – Records items typed into the Windows Run dialog by the user. 
- UserAssist – ROT-13 encoded names of GUI programs that have been run and the number of times each has run. 
- HKCU\SOFTWARE\Microsoft\Windows\Shell – Often referred to as Shellbags, this registry location (NTUSER.DAT) and the following one (UsrClass.dat) record whenever a user accesses a folder or zip file. They can be manually parsed, but using a tool like ShellBags Explorer by Eric Zimmerman can automate much of the work. 
- HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ - Run\ - used by attackers for persistence 
 
 
Free Digital Forensics Software
- Eric Zimmerman Tools - https://ericzimmerman.github.io/ 
- SANS SIFT - https://digital-forensics.sans.org/community/downloads 
- The Sleuth Kit Autopsy - http://www.sleuthkit.org/autopsy/ 
- Oxygen Forensic Suite - Used for mobile phones - https://www.oxygen-forensic.com/en/ 
- FTK Imager - http://accessdata.com/product-download/ftk-imager-version-3.4.3 
- Volatility - python script to analyze a memory dump. - https://volatilityfoundation.org/ 
- RedLine by FireEye - used to get disk and memory capture of Windows targets - https://fireeye.market/apps/211364 
- Dirbuster - directory enumeration on web servers. 
 
        
        
      
    
    Blue Team/ Defender Essentials
Important Sites to Know
- MITRE ATT&CK- Knowldge base of adversary tactics, techniques, and procedures. - https://attack.mitre.org/ 
- CISA - Cyber Security Advisories - https://www.cisa.gov/news-events/cybersecurity-advisories 
- Exploit DV -Current and old exploits - https://www.exploit-db.com/ 
- NIST 800-53 - Security and Privacy controls for Information Systems and Organizations - https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final 
- CVE Details - Database of Vulnerabilities - https://www.cvedetails.com/ 
- CSA CCM - Cloud Controls Matrix - https://cloudsecurityalliance.org/research/cloud-controls-matrix 
- Mobile Security Framework - Upload an APK and scan it to see if its malicious. - https://mobsf.live/ 
- Suricata with ELK- Used for scanning network traffic for malicious activity - https://www.criticaldesign.net/post/how-to-setup-a-suricata-ips-elk-stack