PinnedAnalyzing access logs using only bash commandsLast week we were doing an incident response on an Exchange Server. We were analyzing a Proxyshell exploit (surprise surprise) and we had…Nov 24, 2021Nov 24, 2021
PinnedThreat Hunting with Kape Across the EnterpriseIf you are doing digital forensics investigation or threat hunting you probably know one of the key source is execution artifacts.Feb 22, 2021Feb 22, 2021