Satyender Yadav (@thedeadthinker) 's Twitter Profile
Satyender Yadav

@thedeadthinker

DFIR | Security Researcher

ID: 1209924317724561408

linkhttps://github.com/SatyenderYadav calendar_today25-12-2019 19:50:22

15 Tweet

104 Followers

185 Following

Satyender Yadav (@thedeadthinker) 's Twitter Profile Photo

Hi Everyone, My blog content has moved to a new site! 🎉 All old posts are there, and new content is coming by the end of this month or next. Check it out! 🔗 blog.threatbreach.io #TechBlog #Cybersecurity #ThreatDetection #BlueTeam #RedTeam #Malware #ReverseEngineering

Satyender Yadav (@thedeadthinker) 's Twitter Profile Photo

🚀 Announcing ThreatBreach Lab! 🚀 ThreatBreach Lab provides evidence and artefacts for real-time breach scenarios to investigate and analyse to hone skills in: 🔍 Malware Analysis ☁️ Cloud Threat Detection 🔧 DFIR & more! lab.threatbreach.io

ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 New Lab Alert: Evil Corp Breach! 🌩️🔒 Lab: lab.threatbreach.io/labs/evilcorp-… Explore how attackers exploit AWS misconfigurations, and exfiltrate data and detect all attacks using multiple logs and disk images. #AWS #CloudSecurity #CyberSecurity #Infosec #SecOps #ThreatDetection

🚀 New Lab Alert: Evil Corp Breach! 🌩️🔒

Lab: lab.threatbreach.io/labs/evilcorp-…

Explore how attackers exploit AWS misconfigurations, and exfiltrate data and detect all attacks using multiple logs and disk images.

#AWS #CloudSecurity #CyberSecurity #Infosec #SecOps #ThreatDetection
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 AWS Threat Detection Blog Series: Part - 1 🚀 Link: blog.threatbreach.io/posts/aws-thre… This Blog Series will cover: - Attacker Tactics - Log configuration mastery - Log analysis - Top threat detection tools #AWS #CloudSecurity #Cybersecurity #ThreatDetection #infosec

🚀 AWS Threat Detection Blog Series: Part - 1 🚀

Link: blog.threatbreach.io/posts/aws-thre…

This Blog Series will cover:
- Attacker Tactics
- Log configuration mastery
- Log analysis
- Top threat detection tools

 #AWS #CloudSecurity #Cybersecurity #ThreatDetection #infosec
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 Blog Series Update! The second part of the blog series dives into AWS logging capabilities! Link: blog.threatbreach.io/posts/aws-thre… Learn how to collect logs from S3 buckets, VPC, and more. #AWS #CloudSecurity #Logging #TechBlog #ThreatDetection #CyberSecurity #infosec

🚀 Blog Series Update!
The second part of the blog series dives into AWS logging capabilities!
Link: blog.threatbreach.io/posts/aws-thre…

Learn how to collect logs from S3 buckets, VPC, and more.
#AWS #CloudSecurity #Logging #TechBlog #ThreatDetection #CyberSecurity #infosec
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 New Blog Alert: AWS Threat Detection Series 🚀 Link: blog.threatbreach.io/posts/aws-thre… Explore how CloudTrail logs can detect attacks in AWS environments. Learn to map activities to the MITRE ATT&CK Framework. #AWSSecurity #CloudSecurity #ThreatDetection #CloudTrail #MITREATTACK

🚀 New Blog Alert: AWS Threat Detection Series 🚀
Link: blog.threatbreach.io/posts/aws-thre…

Explore how CloudTrail logs can detect attacks in AWS environments. Learn to map activities to the MITRE ATT&CK Framework.

#AWSSecurity #CloudSecurity #ThreatDetection #CloudTrail #MITREATTACK
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚀 AWS Threat Detection Part 3 - II Link: blog.threatbreach.io/posts/aws-thre… In the last part, we reviewed CloudTrail logs to investigate suspicious activity. In this part let's analyse ARN & IPs and build a timeline. #CloudSecurity #AWSSecurity #ThreatDetection #CloudTrail #ThreatHunting

🚀 AWS Threat Detection Part 3 - II
Link: blog.threatbreach.io/posts/aws-thre…

In the last part, we reviewed CloudTrail logs to investigate suspicious activity. In this part let's analyse ARN & IPs and build a timeline.

#CloudSecurity #AWSSecurity #ThreatDetection #CloudTrail #ThreatHunting
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🎉 DFIR Labs CTF Winners 🎉 We’re thrilled to announce the winners of our latest CTF: 🏆 1st Place: ekt0 (Synacktiv) - 🇫🇷 🥈 2nd Place: Satyender Yadav 🥉 3rd Place: c0t0d0s2 - 🇵🇱 A big thank you to all participants and supporters for making this event a success!

🎉 DFIR Labs CTF Winners 🎉

We’re thrilled to announce the winners of our latest CTF:

🏆 1st Place: <a href="/ektoplasma_/">ekt0</a> (<a href="/Synacktiv/">Synacktiv</a>) - 🇫🇷
🥈 2nd Place: <a href="/thedeadthinker/">Satyender Yadav</a>
🥉 3rd Place: c0t0d0s2 - 🇵🇱

A big thank you to all participants and supporters for making this event a success!
Satyender Yadav (@thedeadthinker) 's Twitter Profile Photo

🚨 Master #MemoryForensics: New Series Coming Soon on ThreatBreach! 🚨 It will cover: - How memory works & acquiring, analysing memory from systems - Using #VolatilityFramework & Developing plugins (not pstree & pslist 😉) - Hunting & uncovering hidden malware, processes etc.

🚨 Master #MemoryForensics: New Series Coming Soon on <a href="/threatbreach/">ThreatBreach</a>! 🚨
It will cover:
- How memory works &amp; acquiring, analysing memory from systems
- Using #VolatilityFramework &amp; Developing plugins (not pstree &amp; pslist 😉)
- Hunting &amp; uncovering hidden malware, processes etc.
ThreatBreach (@threatbreach) 's Twitter Profile Photo

Part 1 of Memory Forensics Mastery series! 🔍 Link: blog.threatbreach.io/posts/memory-f… Topics include: 🎯Why memory forensics matters 🎯What is Virtual memory and Virtual to physical address mapping 🎯Paging, fragmentation & segmentation #MemoryForensics #CyberSecurity #DigitalForensics

Part 1 of Memory Forensics Mastery series! 🔍
Link: blog.threatbreach.io/posts/memory-f…

Topics include:
🎯Why memory forensics matters 
🎯What is Virtual memory and Virtual to physical address mapping
🎯Paging, fragmentation &amp; segmentation 

#MemoryForensics #CyberSecurity #DigitalForensics
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚨[ Memory Forensics Mastery Part - 2 ] Acquisition of Memory Evidence 👉Link:blog.threatbreach.io/posts/memory-f… Topics Include: 🎯Why memory acquisition matters in DFIR 🎯Methods: live analysis, crashdump files & more 🎯Tools and more #DFIR #MemoryForensics #IncidentResponse #BlueTeam

🚨[ Memory Forensics Mastery Part - 2 ] Acquisition of Memory Evidence
👉Link:blog.threatbreach.io/posts/memory-f…

Topics Include:
🎯Why memory acquisition matters in DFIR
🎯Methods: live analysis, crashdump files &amp; more
🎯Tools and more

#DFIR #MemoryForensics #IncidentResponse #BlueTeam
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🎉 DFIR Labs CTF Winners🎉 We’re thrilled to announce the winners of our latest CTF: 🏆 1st Place: Security Boi 🥈 2nd Place: Satyender Yadav 🥉 3rd Place: p500 A big thank you to all participants and supporters for making this event a success!

🎉 DFIR Labs CTF Winners🎉
 
We’re thrilled to announce the winners of our latest CTF:
 
🏆 1st Place: <a href="/0x49736b/">Security Boi</a>
🥈 2nd Place: <a href="/thedeadthinker/">Satyender Yadav</a>
🥉 3rd Place: p500
 
A big thank you to all participants and supporters for making this event a success!
ThreatBreach (@threatbreach) 's Twitter Profile Photo

🚨 New Lab Alert! Container At Risk 🐳 Link: lab.threatbreach.io/labs/container… Explore a hands-on Linux server compromise lab. Investigate CVE exploitation, Docker escape, privilege escalation, and persistence. #Cybersecurity #Linux #Docker #CVE #DFIR #Forensics #IncidentResponse

🚨 New Lab Alert! Container At Risk 🐳
Link: lab.threatbreach.io/labs/container…

Explore a hands-on Linux server compromise lab. Investigate CVE exploitation, Docker escape, privilege escalation, and persistence. 

#Cybersecurity #Linux #Docker #CVE #DFIR #Forensics #IncidentResponse
Satyender Yadav (@thedeadthinker) 's Twitter Profile Photo

🚀 My new lab, Beta Gamer, is live on the CyberDefenders®™ Platform! Dive into key Windows artifacts and learn how to investigate them. I would love to hear your thoughts and feedback! Thanks to CyberDefenders Team for the opportunity 🙌 #DFIR #IncidentResponse #DiskForensic