Browse Skills
Analyzing Threat Actor Ttps With Mitre Attack
v1.0.0MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. This skill covers systematically mapping threat actor beh
Analyzing Supply Chain Malware Artifacts
v1.0.0Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines, and sideloaded dependencies to identify intrusion vectors and scope of compromise.
Analyzing Slack Space And File System Artifacts
v1.0.0Examine file system slack space, MFT entries, USN journal, and alternate data streams to recover hidden data and reconstruct file activity on NTFS volumes.
Analyzing Security Logs With Splunk
v1.0.0>
Analyzing Ransomware Network Indicators
v1.0.0Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration flows, and encryption key exchange via Zeek conn.log and NetFlow analysis
Analyzing Ransomware Leak Site Intelligence
v1.0.0Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence on group tactics, and assess sector-specific ransomware risk for proactive defense.
Analyzing Ransomware Encryption Mechanisms
v1.0.0>
Analyzing Prefetch Files For Execution History
v1.0.0Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.
Analyzing Powershell Script Block Logging
v1.0.0>-
Analyzing Powershell Empire Artifacts
v1.0.0Detect PowerShell Empire framework artifacts in Windows event logs by identifying Base64 encoded launcher patterns, default user agents, staging URL structures, stager IOCs, and known Empire module signatures in Script Block Logging events.
Analyzing Phishing Email Headers
v1.0.0Email headers contain critical metadata that reveals the true origin, routing path, and authentication status of emails. Analyzing these headers is a foundational skill for identifying phishing attemp
Analyzing Persistence Mechanisms In Linux
v1.0.0Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD hijacking, bashrc modifications, and authorized_keys backdoors using auditd and file integrity monitoring