{"id":378,"date":"2024-11-30T22:07:18","date_gmt":"2024-11-30T22:07:18","guid":{"rendered":"https:\/\/justatrainingblog.co.uk\/?p=378"},"modified":"2024-12-08T19:17:26","modified_gmt":"2024-12-08T19:17:26","slug":"11-24-learning-progress","status":"publish","type":"post","link":"https:\/\/justatrainingblog.co.uk\/?p=378","title":{"rendered":"Nov 24 &#8211; Learning Progress"},"content":{"rendered":"\n<p>November has been a productive month for progression and broadening practical knowledge in the field. With new tools being implemented at work this was a good month to get some lab experience in and shore up some areas which I have identified of needing improvement. <br><br><span style=\"text-decoration: underline;\"><strong>Immersive Labs<\/strong><\/span><\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\"><br><\/span><strong>Threat Hunting<br><\/strong>CVE-2024-0012 and CVE-2024-9474 (Palo Alto PAN-OS) \u2013 Defensive<br><br><strong>Autopsy<\/strong><br>Autopsy: Ep.1 &#8211; Getting Started<br>Autopsy: Ep.2 \u2013 Cases and Data<br>Autopsy: Ep.3 \u2013 Tags, Comments, and Reports<br>Autopsy: Ep.4 \u2013 Files and Volumes<br>Autopsy: Ep.5 \u2013 Web and Browsers<br>Autopsy: Ep.6 \u2013 Emails and Messages<br>Autopsy: Ep.7 \u2013 Applications and Mobile<br>Autopsy: Ep.8 \u2013 Media and Audio-Visual Data<br>Autopsy: Ep.9 \u2013 Timeline<br>Autopsy: Ep.10 \u2013 Case Report<br>Autopsy: Demonstrate Your Skills<br><br><strong>Nmap<\/strong><br>Nmap: Ep.1 \u2013 Intro to Nmap<br>Nmap Ep.2 &#8211; Using Nmap<br>Nmap: Ep.3 \u2013 Host Discovery<br>Nmap: Ep.4 \u2013 Port Scanning<br>Nmap: Ep.5 \u2013 OS and Version Detection<br>Nmap: Ep.6 \u2013 Scripting<br>Nmap: Ep.7 \u2013 Scan Optimization<br>Nmap: Ep.8 \u2013 Scan Output<br>Nmap: Ep.9 \u2013 Demonstrate Your Skills<br><br><strong><span style=\"text-decoration: underline;\">Scanning<\/span><\/strong><br>Scanning: Nikto and DIRB<br>Scanning: Port Knocking<br>Scanning: DNS Enumeration<br>Scanning: WPScan<br>Scanning: DrupeScan<br>Scanning: Banner Grabbing<br>Scanning: DNS Zone Transfer<br>Scanning: Network Scanning<br>Scanning: Demonstrate Your Skills<br><br><strong><span style=\"text-decoration: underline;\">Eric Zimmerman&#8217;s Tools<\/span><\/strong><br>Eric Zimmerman&#8217;s Tools: Introduction<br>Eric Zimmerman&#8217;s Tools: EvtxECmd and Timeline Explorer<br>Eric Zimmerman&#8217;s Tools: RECmd and Registry Explorer<br>Eric Zimmerman&#8217;s Tools: MFTECmd and MFTExplorer<br>Eric Zimmerman&#8217;s Tools: SBECmd and ShellBags Explorer<br>Eric Zimmerman&#8217;s Tools: LECmd<br>Eric Zimmerman&#8217;s Tools: RBCmd<br>Eric Zimmerman&#8217;s Tools: PECmd<br>Eric Zimmerman&#8217;s Tools:AppCompatCacheParser<br>Eric Zimmerman&#8217;s Tools: AmcacheParser<br><strong>Eric Zimmerman&#8217;s Tools: Demonstrate Your Skills<br><\/strong><\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Malicious Document Analysis<\/span><\/strong><br>Malicious Document Analysis: Introduction to Malicious Documents<br>Malicious Document Analysis: Powerpoint as a Malware Dropper<br>Malicious Document Analysis: DDE Analysis<br>Malicious Document Analysis: Visual Basic for Applications (VBA)<br><\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Wireshark<\/span><\/strong><br>Wireshark: Introduction to Wireshark<br>Wireshark: Display Filters &#8211; Introduction to Filters<br>Wireshark: Display Filters &#8211; Diving in<br>Wireshark: Display Filters &#8211; Combining Filters<br>Wireshark: Metrics and Statistics<br>Wireshark: Stream\/Object Extraction<br>Wireshark: TLS Traffic<br>Wireshark: Using Tshark<br><strong>Wireshark: Demonstrate Your Skills<\/strong><\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\"><strong>Digital Forensics<\/strong><\/span><br>Digital Forensics: Windows Image Analysis<br>Digital Forensics: Ubuntu Image Analysis<br>Digital Forensics: File Carving<br>Digital Forensics: Bulk Extractor<br>Digital Forensics: File Systems<br>Digital Forensics: Google Chrome Artifacts<br>Digital Forensics: Mozilla Firefox Artifacts<br>Digital Forensics: MagicBytes<br>Digital Forensics: analyzeMFT<br>Digital Forensics: National Software Reference Library (NSRL)<br>Digital Forensics: Timestomping<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>November has been a productive month for progression and broadening practical knowledge in the field. With new tools being implemented&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[2,10],"tags":[],"class_list":["post-378","post","type-post","status-publish","format-standard","hentry","category-learning","category-updates"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=378"}],"version-history":[{"count":17,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/378\/revisions"}],"predecessor-version":[{"id":443,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/378\/revisions\/443"}],"wp:attachment":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}