Windows Investigation

Scenario

A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.

.

Introduction

Windows systems are often the primary target in cyber attacks, making proper investigation essential. My work involves analyzing event logs, registry changes, user activity, and system artifacts to uncover traces of malicious behavior. By reconstructing attacker actions and identifying persistence methods, I help detect compromises early and strengthen overall system defenses. 

Methodology

Step 1: Check user's activity.

We need to identify who were the last to log into the machine and know which activities to trace.