What's Edge Thoughts?
These are my thoughts and notes about all things, but not limited to, defensive cyber security, threat hunting and digital forensics. Basically I needed a place to dump my brain contents where I come and retrieve it at a later date.
Purpose
The goal of this site is simple. Read clever researcher's work, the latest cyber threat intelligence or various documentation give it a go, then document the results. I'm hoping to document various aspects of defensive cyber security such as:
- Using powershell, cmd and bash for investigations.
- How-to perform forensic analysis on memory, disk, filesystem, etc.
- Learning more about windows and linux system internals.
- See what forensic artifacts TTPs leave behind on a system.
- Guides on how to use various industry tools.
Info
- Do not expect my notes to be comprehensive.
- Expect mistakes. I make them! You will too!
- Consult additional resources if it doesn't work the way you want.
Warning
This notebook is created by David M Reiling. Copying it, cloning it or using some janky AI tool to re-present it is your own is NOT OK (and probably illegal).