Joe Raine
Cybersecurity Professional
Joe Raine
Cybersecurity Professional

Blog Post

11/24 – Learning Progress

November 30, 2024 Learning, Updates

November has been a productive month for progression and broadening practical knowledge in the field. With new tools being implemented at work this was a good month to get some lab experience in and shore up some areas which I have identified of needing improvement.

Immersive Labs


Threat Hunting
CVE-2024-0012 and CVE-2024-9474 (Palo Alto PAN-OS) – Defensive

Autopsy
Autopsy: Ep.1 – Getting Started
Autopsy: Ep.2 – Cases and Data
Autopsy: Ep.3 – Tags, Comments, and Reports
Autopsy: Ep.4 – Files and Volumes
Autopsy: Ep.5 – Web and Browsers
Autopsy: Ep.6 – Emails and Messages
Autopsy: Ep.7 – Applications and Mobile
Autopsy: Ep.8 – Media and Audio-Visual Data
Autopsy: Ep.9 – Timeline
Autopsy: Ep.10 – Case Report
Autopsy: Demonstrate Your Skills

Nmap
Nmap: Ep.1 – Intro to Nmap
Nmap Ep.2 – Using Nmap
Nmap: Ep.3 – Host Discovery
Nmap: Ep.4 – Port Scanning
Nmap: Ep.5 – OS and Version Detection
Nmap: Ep.6 – Scripting
Nmap: Ep.7 – Scan Optimization
Nmap: Ep.8 – Scan Output
Nmap: Ep.9 – Demonstrate Your Skills

Scanning
Scanning: Nikto and DIRB
Scanning: Port Knocking
Scanning: DNS Enumeration
Scanning: WPScan
Scanning: DrupeScan
Scanning: Banner Grabbing
Scanning: DNS Zone Transfer
Scanning: Network Scanning
Scanning: Demonstrate Your Skills

Eric Zimmerman’s Tools
Eric Zimmerman’s Tools: Introduction
Eric Zimmerman’s Tools: EvtxECmd and Timeline Explorer
Eric Zimmerman’s Tools: RECmd and Registry Explorer
Eric Zimmerman’s Tools: MFTECmd and MFTExplorer
Eric Zimmerman’s Tools: SBECmd and ShellBags Explorer
Eric Zimmerman’s Tools: LECmd
Eric Zimmerman’s Tools: RBCmd
Eric Zimmerman’s Tools: PECmd
Eric Zimmerman’s Tools:AppCompatCacheParser
Eric Zimmerman’s Tools: AmcacheParser
Eric Zimmerman’s Tools: Demonstrate Your Skills

Malicious Document Analysis
Malicious Document Analysis: Introduction to Malicious Documents
Malicious Document Analysis: Powerpoint as a Malware Dropper
Malicious Document Analysis: DDE Analysis
Malicious Document Analysis: Visual Basic for Applications (VBA)

Wireshark
Wireshark: Introduction to Wireshark
Wireshark: Display Filters – Introduction to Filters
Wireshark: Display Filters – Diving in
Wireshark: Display Filters – Combining Filters
Wireshark: Metrics and Statistics
Wireshark: Stream/Object Extraction
Wireshark: TLS Traffic
Wireshark: Using Tshark
Wireshark: Demonstrate Your Skills

Digital Forensics
Digital Forensics: Windows Image Analysis
Digital Forensics: Ubuntu Image Analysis
Digital Forensics: File Carving
Digital Forensics: Bulk Extractor
Digital Forensics: File Systems
Digital Forensics: Google Chrome Artifacts
Digital Forensics: Mozilla Firefox Artifacts
Digital Forensics: MagicBytes
Digital Forensics: analyzeMFT
Digital Forensics: National Software Reference Library (NSRL)
Digital Forensics: Timestomping