introduce concepts phase 1-2

This commit is contained in:
overcuriousity
2025-07-20 17:33:56 +02:00
parent 0648647c8a
commit 202ee5f801
7 changed files with 200 additions and 85 deletions

View File

@@ -1904,6 +1904,95 @@ tools:
- jamf
- enterprise
- commandline
- name: Regular Expressions (Regex)
icon: 🔤
type: concept
description: >-
Pattern matching language for searching, extracting, and manipulating text.
Essential for log analysis, malware signature creation, and data extraction from
unstructured sources. Forms the backbone of many forensic tools and custom scripts.
domains:
- incident-response
- malware-analysis
- network-forensics
- fraud-investigation
phases:
- examination
- analysis
platforms: []
domain-agnostic-software: null
skillLevel: intermediate
accessType: null
url: https://regexr.com/
projectUrl: null
license: null
knowledgebase: false
tags:
- pattern-matching
- text-processing
- log-analysis
- string-manipulation
- search-algorithms
- name: SQL Query Fundamentals
icon: 🗃️
type: concept
description: >-
Structured Query Language for database interrogation and analysis. Critical for
examining application databases, SQLite artifacts from mobile devices, and
browser history databases. Enables complex correlation and filtering of large datasets.
domains:
- incident-response
- mobile-forensics
- fraud-investigation
- cloud-forensics
phases:
- examination
- analysis
platforms: []
domain-agnostic-software: null
skillLevel: intermediate
accessType: null
url: https://www.w3schools.com/sql/
projectUrl: null
license: null
knowledgebase: false
tags:
- database-analysis
- query-language
- data-correlation
- mobile-artifacts
- browser-forensics
- name: Hash Functions & Digital Signatures
icon: 🔐
type: concept
description: >-
Cryptographic principles for data integrity verification and authentication.
Fundamental for evidence preservation, malware identification, and establishing
chain of custody. Understanding of MD5, SHA, and digital signature validation.
domains:
- incident-response
- law-enforcement
- malware-analysis
- cloud-forensics
phases:
- data-collection
- examination
platforms: []
domain-agnostic-software: null
skillLevel: advanced
accessType: null
url: https://en.wikipedia.org/wiki/Cryptographic_hash_function
projectUrl: null
license: null
knowledgebase: false
tags:
- cryptography
- data-integrity
- evidence-preservation
- malware-identification
- chain-of-custody
domains:
- id: incident-response
name: Incident Response & Breach-Untersuchung