PinnedChris EastwoodinDigital ForensicsAnalysing Encoded Powershell and ShellcodeBase64 encoded PowerShell commands can often be a quick win for the identification of suspicious activity. Recently, I've come across some…5 min read·Apr 26, 2021----
Chris EastwoodinMalware AnalysisLab 6 — C Code Constructs in AssemblySolutions for Lab 6 within Practical Malware Analysis.11 min read·Jan 2, 2022----
Chris EastwoodinMalware AnalysisLab 5 — IDA ProSolutions for Lab 5 within Practical Malware Analysis.11 min read·Dec 29, 2021--1--1
Chris EastwoodinBlue Team Labs Online — WalkthroughsBTLO — Phishy-v1BTLO (blueteamlabs.online)4 min read·Apr 30, 2021----
Chris EastwoodinBlue Team Labs Online — WalkthroughsBTLO —Malicious PowerShell AnalysisBTLO (blueteamlabs.online)4 min read·Apr 30, 2021----
Chris EastwoodinBlue Team Labs Online — WalkthroughsBTLO — Network Analysis — Web ShellBTLO (blueteamlabs.online)4 min read·Apr 30, 2021----
Chris EastwoodinBlue Team Labs Online — WalkthroughsBTLO — PretiumBTLO (blueteamlabs.online)6 min read·Apr 2, 2021----
Chris EastwoodinBlue Team Labs Online — WalkthroughsBTLO — CountdownBTLO (blueteamlabs.online)5 min read·Apr 2, 2021----
Chris EastwoodinDigital ForensicsShellbag AnalysisAnalysis of Shellbags is extremely useful method of determining what file or folder actions have been taken on a host by a specific user.3 min read·Nov 17, 2020----