Threat Hunting – Process Explorer Deep Dive (Catch Malware & Preserve Artifacts)
🎬 How can we analyse a Windows system for malware while making sure to preserve crucial forensic evidence?
In the first part (🇬🇧 English audio) of this three-part Threat Hunting series, I delve into Process Explorer, showing how we can further expand our DFIR arsenal by fine-tuning this Sysinternals tool.
✅ This video will equip you with practical skills to uncover hidden threats, analyse suspicious processes and understand how processes work and behave behind the scenes.
You will also discover the correct sequence to preserve critical forensic evidence and learn how to easily obtain file hashes in both Windows and Linux through the command line.
Watch our video! Threat Hunting – Process Explorer Deep Dive (Catch Malware & Preserve Artifacts)