<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>sdp4n6.dev // cyber research</title><link>https://sdp4n6.dev/</link><description>Recent content on sdp4n6.dev // cyber research</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 15 Feb 2026 11:02:00 -0500</lastBuildDate><atom:link href="https://sdp4n6.dev/index.xml" rel="self" type="application/rss+xml"/><item><title>About</title><link>https://sdp4n6.dev/about/</link><pubDate>Sun, 15 Feb 2026 11:02:00 -0500</pubDate><guid>https://sdp4n6.dev/about/</guid><description>&lt;p&gt;&lt;figure class="article-figure"&gt;
 &lt;img src="https://sdp4n6.dev/images/avatar.svg" alt="sdp4n6 avatar" loading="lazy"&gt;
 
&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;I am a Senior Analyst in the domain of Cyber Defense operating across CSIRT and the Security Intelligence Center (SIC) operations, focused on high-fidelity incident response, threat hunting, detection engineering, and intelligence gathering.&lt;/p&gt;
&lt;p&gt;My day-to-day work involves leading high-severity Cyber Intrusions, Incident Response &amp;amp; Digital Forensic investigations spanning multiple areas such as endpoint, network, and cloud telemetry, with practical depth in triage, containment, digital evidence handling, and post-incident root cause analysis. My background spans SOC operations, malware investigation, and threat hunting across enterprise environments.&lt;/p&gt;</description></item><item><title>DFIR Artifact Quick Reference</title><link>https://sdp4n6.dev/cheatsheets/dfir/dfir-artifacts-guide/</link><pubDate>Sun, 15 Feb 2026 11:02:00 -0500</pubDate><guid>https://sdp4n6.dev/cheatsheets/dfir/dfir-artifacts-guide/</guid><description>&lt;h1 id="dfir-artifact-quick-reference"&gt;DFIR Artifact Quick Reference&lt;/h1&gt;
&lt;hr&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Audience:&lt;/strong&gt; DFIR practitioners conducting Windows-centric incident response and forensic investigations.&lt;br&gt;
&lt;strong&gt;Scope:&lt;/strong&gt; Windows 10/11, Server 2016–2022 unless noted.&lt;br&gt;
&lt;strong&gt;Legend:&lt;/strong&gt; &lt;code&gt;[EZ]&lt;/code&gt; = Eric Zimmerman tool | &lt;code&gt;[TS]&lt;/code&gt; = Triaged from live system | &lt;code&gt;[IMG]&lt;/code&gt; = Requires disk image&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="table-of-contents"&gt;Table of Contents&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="#1-execution-artifacts"&gt;Execution Artifacts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#2-persistence-mechanisms"&gt;Persistence Mechanisms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#3-account--authentication-activity"&gt;Account &amp;amp; Authentication Activity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#4-lateral-movement-indicators"&gt;Lateral Movement Indicators&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#5-file-system--file-activity"&gt;File System &amp;amp; File Activity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#6-network-activity"&gt;Network Activity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#7-anti-forensics--defense-evasion"&gt;Anti-Forensics &amp;amp; Defense Evasion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#8-data-exfiltration-indicators"&gt;Data Exfiltration Indicators&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#9-cloud--browser-artifacts"&gt;Cloud &amp;amp; Browser Artifacts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#10-key-event-log-ids-reference"&gt;Key Event Log IDs Reference&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#11-critical-registry-keys-reference"&gt;Critical Registry Keys Reference&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#12-recommended-toolchain"&gt;Recommended Toolchain&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;hr&gt;
&lt;h2 id="1-execution-artifacts"&gt;1. Execution Artifacts&lt;/h2&gt;
&lt;h3 id="prefetch"&gt;Prefetch&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Property&lt;/th&gt;
 &lt;th&gt;Detail&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Path&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;C:\Windows\Prefetch\*.pf&lt;/code&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Exists on&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Workstations (enabled by default); Servers (disabled by default)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Key Data&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Executable name, run count, last 8 run timestamps, files/dirs referenced&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Tool&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;PECmd.exe&lt;/code&gt; [EZ]&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Investigative Value&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Proves execution even if binary is deleted; timestamps survive binary removal&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;ATT&amp;amp;CK&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;T1204, T1059&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Notes:&lt;/strong&gt;&lt;/p&gt;</description></item></channel></rss>