Live stream finished (18 minutes)
Those who are in Cyber Forensics join the class
π2
Guys follow this page for new books by JD π€
https://www.instagram.com/jd_xiwrites?igsh=aGNrM3psNGR4ZHFp
https://www.instagram.com/jd_xiwrites?igsh=aGNrM3psNGR4ZHFp
β€1
On end off my birthday
I'm giving this last update
If your serious about you future and carrier it will help a lot result will make you a perfect
The course I have mentioned above is still have same price with discount 1499 only
And registration closes 25th June 2025
Interested people can join fast
After date it will closes
only time left 23hrs
For registration contact @arjun_vasudeva @oyee11
I'm giving this last update
If your serious about you future and carrier it will help a lot result will make you a perfect
The course I have mentioned above is still have same price with discount 1499 only
And registration closes 25th June 2025
Interested people can join fast
After date it will closes
only time left 23hrs
For registration contact @arjun_vasudeva @oyee11
β€2
[ πππ£πππ€ππ π₯ππ§π©π£ππ§ ] α΅αΆ αΆ β±αΆβ±α΅Λ‘ inc. COMPANY
Photo
.. update for who staking and doing trading listen above audio
From ceasefire I think it won't happen
But some about chances are there
Keep a eye on it
Eppudu ela untadhi telidhu stock Market
From ceasefire I think it won't happen
But some about chances are there
Keep a eye on it
Eppudu ela untadhi telidhu stock Market
β€1
[ πππ£πππ€ππ π₯ππ§π©π£ππ§ ] α΅αΆ αΆ β±αΆβ±α΅Λ‘ inc. COMPANY
On end off my birthday I'm giving this last update If your serious about you future and carrier it will help a lot result will make you a perfect The course I have mentioned above is still have same price with discount 1499 only And registration closesβ¦
Gentle reminder π
Last 8hrs left βΆοΈ
Hurry up guy's who are interested
Last 8hrs left βΆοΈ
Hurry up guy's who are interested
Task :
Your SOC team receives a report from an employee that their system is showing a ransom note demanding 2 BTC. The system is Windows 10 Pro. You are provided with the following forensic artifacts:
1. A memory dump of the affected system.
2. A copy of the AppData folder from the infected userβs profile.
3. The System.evtx and Security.evtx log files.
4. A suspicious binary named helperservice.exe found running at the time of infection.
Your task is to:
1. Identify how the ransomware initially entered the system (initial infection vector).
2. Reverse engineer helperservice.exe and determine:
Whether it is responsible for encryption.
The encryption method used.
Any weakness or hardcoded keys present.
3. Analyze the memory dump and logs to reconstruct a full timeline of the attack.
4. Extract the ransomware note from memory or disk and analyze if there is any clue to decrypt the files.
5. Identify if lateral movement occurred on the network.
Your SOC team receives a report from an employee that their system is showing a ransom note demanding 2 BTC. The system is Windows 10 Pro. You are provided with the following forensic artifacts:
1. A memory dump of the affected system.
2. A copy of the AppData folder from the infected userβs profile.
3. The System.evtx and Security.evtx log files.
4. A suspicious binary named helperservice.exe found running at the time of infection.
Your task is to:
1. Identify how the ransomware initially entered the system (initial infection vector).
2. Reverse engineer helperservice.exe and determine:
Whether it is responsible for encryption.
The encryption method used.
Any weakness or hardcoded keys present.
3. Analyze the memory dump and logs to reconstruct a full timeline of the attack.
4. Extract the ransomware note from memory or disk and analyze if there is any clue to decrypt the files.
5. Identify if lateral movement occurred on the network.
β€3π₯°2
Paina oka task icchanu andharu complete cheyyandi
Anonymous Poll
54%
Yes sir
33%
Let me try
13%
Will complete definitely π
β€4
Live stream finished (54 minutes)
Everyone join the class at 7:30 PM
β€5
Live stream finished (34 minutes)