A Guide to LNK File Forensics

The Cyber Mentor · Beginner ·🔐 Cybersecurity ·4d ago
https://www.tcm.rocks/psap-y - Get ready for the upcoming TCM Security forensics course by visiting some of our existing blue team content, like the Practical SOC Analyst Professional (PSAP), a certification exam experience that focuses on threat hunting and incident response. Why are Windows LNK files such useful artifacts in digital forensics? Andrew Prince gives a quick rundown on what LNK files can reveal about what a user was doing on a system. This video will be enough to get you started on LNK files as you continue on your Windows forensics journey. Watch earlier forensics videos here: https://www.tcm.rocks/forensics-playlist #forensics #dfir #cybersecurity #blueteam #digitalforensics Sponsor a Video: https://www.tcm.rocks/Sponsors Pentests & Security Consulting: https://tcm-sec.com Get Trained: https://www.tcm.rocks/acad-y Get Certified: http://www.tcm.rocks/certs-y Merch: https://www.bonfire.com/store/tcm-security/ 📱Social Media📱 ___________________________________________ X: https://x.com/TCMSecurity Twitch: https://www.twitch.tv/thecybermentor Instagram: https://www.instagram.com/tcmsecurity/ LinkedIn: https://www.linkedin.com/company/tcm-security-inc/ TikTok: https://www.tiktok.com/@tcmsecurity Discord: https://discord.gg/tcm Facebook: https://www.facebook.com/tcmsecure
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Chinese chamber of commerce puts a $432bn price tag on the EU’s cybersecurity overhaul
EU's cybersecurity overhaul could cost $432bn by phasing out Chinese suppliers, according to a study by KPMG
The Next Web AI
Is Cyber Security Certification Worth the Cost in India?
Learn whether cyber security certification is worth the cost in India and how it can benefit your career
Medium · Cybersecurity
J’ai arrêté de faire des screenshots : comment l’automatisation a sauvé mon audit SOC 2 type 2.
Learn how automation saved an audit SOC 2 type 2 by streamlining security processes and reducing manual labor, and apply similar strategies to your own security audits
Medium · Cybersecurity
Content Security Policy | TryHackMe
Learn about Content Security Policy (CSP) and how to identify vulnerabilities in CSP headers
Medium · Cybersecurity
Up next
CompTIA Cloud+
Coursera
Watch →