KARIM ASHRAF SPACE.
Search...
Ctrl
K
WRITEUPS
Advanced Log Analysis
Previous
Practical Labs
Next
Key Windows Event IDs for Cybersecurity Monitoring
Last updated
4 months ago
Key Windows Event IDs for Cybersecurity Monitoring
Analyzing a Series of Failed Login Attempts from Multiple IP Addresses
Steps to Investigate Suspicious Outbound Network Traffic
Identifying and Responding to Lateral Movement within a Network
Distinguishing Between Legitimate and Malicious PowerShell Executions
Detecting and Analyzing a Potential Data Exfiltration Incident Using Log Data
Steps to Analyze PowerShell Logging (Event ID 4104) for Malicious Activity
How to Identify an Internal Pivot Attack Using Log Data
Indicators in Logs Suggesting a Privilege Escalation Attack
How to Detect Command and Control (C2) Communication Using Log Analysis
How to Analyze Logs to Detect a Brute-Force Attack on an RDP Service
How to Analyze Logs to Detect a Brute-Force Attack on an RDP Service
How to Detect the Use of Living-Off-the-Land Binaries (LOLBins) in Logs
How to Detect Malware Masquerading as a Legitimate Process Using Log Analysis
How to Detect and Analyze Lateral Movement Using Windows Event Logs
How to Detect Potential Ransomware Attacks in Their Early Stages Using Log Analysis
How to Detect and Analyze Privilege Escalation Using Windows Event Logs
How to Detect the Use of Mimikatz or Similar Tools in Log Data
How to Detect and Analyze DNS Tunneling Through Log Analysis
How to Detect a Pass-the-Hash (PtH) Attack Using Logs
How to Detect and Analyze an Attacker’s Use of a Remote Access Trojan (RAT) Using Log Data
How to Detect Lateral Movement Using Windows Event Logs
How to Detect and Investigate Data Exfiltration Using Logs
How to Identify and Analyze an Internal Phishing Campaign Using Email and System Logs
How to Detect and Analyze Ransomware Activity Using Logs
How to Detect Malicious PowerShell Activity Using Log Analysis
How to Detect and Respond to Brute-Force Attacks Using Log Data
How to Detect Privilege Escalation Attempts Using Windows Event Logs
How to Detect and Analyze Suspicious Domain Name Resolution Requests in DNS Logs
How to Detect and Respond to Unauthorized Access to Critical Files
How to Detect and Analyze Suspicious PowerShell Command Execution
How to Detect and Investigate Account Takeover (ATO) Attempts Using
How to Detect and Analyze the Use of Living Off the Land Binaries (LOLBins)
How to Detect and Investigate Lateral Movement
How to Detect and Investigate Data Exfiltration
How to Detect and Analyze Suspicious Activity Involving Service Accounts
How to Detect and Investigate Anomalous PowerShell Activity Related to Credential Dumping
How to Detect and Analyze the Execution of Unsigned or Malicious Executables
How to Detect and Investigate Abnormal Spikes in Network Traffic