<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://hatsoffsecurity.com/2023/09/06/talking-about-rfc-9424-indicators-of-compromise-iocs-and-their-role-in-attack-defence/</loc><lastmod>2023-09-07T13:38:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2022/09/25/powershell-basic-introduction-security-version/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2022/09/get-alias.png</image:loc><image:title>get-alias</image:title></image:image><lastmod>2022-09-25T21:45:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2022/03/20/improving-technical-interviews/</loc><lastmod>2022-03-20T12:28:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2022/02/28/anydesk-forensic-analysis-and-artefacts/</loc><lastmod>2022-07-31T11:23:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2022/01/09/log4j-log4shell-video-glossary/</loc><lastmod>2022-01-09T22:13:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2022/01/04/hatsoffsecurity-on-youtube/</loc><lastmod>2022-01-04T08:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2020/05/27/how-to-create-a-good-security-ctf/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/sham-wow-vince-shlomi.jpg</image:loc><image:title>sham-wow-vince-shlomi</image:title></image:image><lastmod>2020-05-29T11:05:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2020/05/01/noscript-plugin-forensic-investigation-firefox-tor-browser/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/noscript-logo-full-400-logo_image-default.png</image:loc><image:title>noscript-logo-full-400-logo_image-default</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/icon80_400x400-1-1.png</image:loc><image:title>icon80_400x400 (1)</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/icon80_400x400-1.png</image:loc><image:title>icon80_400x400 (1)</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/tor-browsing-small.png</image:loc><image:title>TOR-Browsing-small</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/tor-browsing.png</image:loc><image:title>TOR-Browsing</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/sync-settings.png</image:loc><image:title>sync-settings</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/sync-logged-in.png</image:loc><image:title>sync-logged-in</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/sync-logged-out.png</image:loc><image:title>sync-logged-out</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/ps-extract-with-key.png</image:loc><image:title>PS-Extract-With-Key</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2020/05/ps-extract-no-key.png</image:loc><image:title>PS-Extract-No-Key</image:title></image:image><lastmod>2022-11-24T21:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2020/02/23/keybase-io-forensics-investigation/</loc><lastmod>2020-02-23T21:35:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/08/29/tip-of-the-hat-to-phase-2a-assessment-engagement/</loc><lastmod>2019-08-10T09:32:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2017/03/11/ttls-and-where-to-find-them/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2017/03/ip-header-ds-colour.png</image:loc><image:title>IP-header-DS-Colour</image:title></image:image><lastmod>2019-08-10T09:31:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2019/08/10/index-dat-not-browsing/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/08/dig-det.png</image:loc><image:title>dig-det</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/08/yahoo_answers.png</image:loc><image:title>yahoo_answers</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/08/index.dat_.png</image:loc><image:title>index.dat</image:title></image:image><lastmod>2020-06-27T12:28:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2019/04/09/http-methods/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/post_request.png</image:loc><image:title>POST_Request</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/get_request.png</image:loc><image:title>GET_Request</image:title></image:image><lastmod>2019-04-09T15:40:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2019/04/03/wireshark-basics/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/flag_output.png</image:loc><image:title>flag_output</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/coffee_flag2.png</image:loc><image:title>coffee_flag2</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/coffee_flag.png</image:loc><image:title>coffee_flag</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/http_decoded_stream.png</image:loc><image:title>http_decoded_stream</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/follow_http.png</image:loc><image:title>follow_http</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/gzip_encoded_stream.png</image:loc><image:title>gzip_encoded_stream</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/follow_tcp.png</image:loc><image:title>follow_tcp</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2019/04/wireshark_overview.png</image:loc><image:title>wireshark_overview</image:title></image:image><lastmod>2019-04-03T15:33:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/10/30/decrypting-traffic-in-wireshark/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/twisted_by_design.png</image:loc><image:title>twisted_by_design</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/rsa_key_list.png</image:loc><image:title>RSA_key_list</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/wireshark-protocol.png</image:loc><image:title>wireshark-protocol</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/ctf-stream.png</image:loc><image:title>CTF-Stream</image:title></image:image><lastmod>2018-10-30T01:02:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/10/29/id-site-from-ssl/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/origin-api.png</image:loc><image:title>origin-api</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/wikihow-conversation.png</image:loc><image:title>wikihow-conversation</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/10/ssl-handshake.png</image:loc><image:title>ssl handshake</image:title></image:image><lastmod>2018-10-29T23:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/01/21/smb2-protocol-negotiation/</loc><lastmod>2018-01-21T11:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/01/14/smb2-file-directory-metadata/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/smb2-meta.png</image:loc><image:title>smb2-meta</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/smb1-meta.png</image:loc><image:title>smb1-meta</image:title></image:image><lastmod>2018-01-14T14:38:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/01/11/smb-tree-connect-response-details/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/smb2-flags.png</image:loc><image:title>smb2 flags</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/smb2-command.png</image:loc><image:title>smb2-command</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/treeconnect-filtered-smbv1.png</image:loc><image:title>treeconnect-filtered-smbv1</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/treeconnect-filtered1.png</image:loc><image:title>treeconnect-filtered</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/treeconnect.png</image:loc><image:title>treeconnect</image:title></image:image><lastmod>2018-01-11T00:09:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/01/11/smbv2-sync-header-explained/</loc><lastmod>2018-01-11T00:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2018/01/10/smb-quick-introduction/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2018/01/os-versions.png</image:loc><image:title>os-versions</image:title></image:image><lastmod>2018-01-10T21:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2017/10/12/unique-usernames/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2017/10/auth_log.png</image:loc><image:title>auth_log</image:title></image:image><lastmod>2017-10-12T12:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2017/06/02/ringzer0team-forensics-challenge-35-poor-internet-connection/</loc><lastmod>2017-11-15T03:38:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/11/22/windows-spotlight-image-location/</loc><lastmod>2016-11-22T19:25:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/11/12/opendoor-scanner-vs-simplehttpserver-pcap/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2016/11/language-and-encoding.png</image:loc><image:title>language-and-encoding</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2016/11/user-agent.png</image:loc><image:title>user-agent</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2016/11/stream0.png</image:loc><image:title>stream0</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2016/11/packets.png</image:loc><image:title>packets</image:title></image:image><lastmod>2017-05-30T11:54:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/11/06/cyber-security-challenge-masterclass-2016/</loc><lastmod>2016-11-06T11:47:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/04/23/removing-cookies/</loc><lastmod>2016-05-04T19:42:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/05/04/flash-cookies-aka-local-share-objects/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2016/05/adobe_site_settings.png</image:loc><image:title>Adobe_Site_Settings</image:title></image:image><lastmod>2016-05-04T19:35:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/04/23/http-cookies-part-1-internet-explorer-and-microsoft-edge/</loc><lastmod>2016-05-04T18:30:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/04/26/http-cookies-part-2-firefox/</loc><lastmod>2016-05-04T18:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/04/27/http-cookies-part-3-chrome-cookies/</loc><lastmod>2016-05-04T18:27:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/04/27/http-cookies-part-4-safari-cookies/</loc><lastmod>2016-04-27T19:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2016/03/01/wireshark-introduction/</loc><lastmod>2016-03-01T00:24:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/09/20/types-of-threat-explained/</loc><lastmod>2015-09-20T15:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/07/17/pass-the-hash-mitigation-tip-of-the-day/</loc><lastmod>2015-07-17T09:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/05/31/force-enabling-readyboost-windows-78/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/05/rb_enabled.jpg</image:loc><image:title>RB_Enabled</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/05/attachstate_key.jpg</image:loc><image:title>attachstate_key</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/05/rb_disabled.jpg</image:loc><image:title>RB_Disabled</image:title></image:image><lastmod>2022-02-11T13:22:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/05/30/usb-roadmap-v2/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/05/usb_roadmap_v2.jpg</image:loc><image:title>usb_roadmap_v2</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/05/usb-roadmap-v2.jpg</image:loc><image:title>USB Roadmap v2</image:title></image:image><lastmod>2015-05-30T13:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/04/05/renaming-a-grr-server-client-configuration/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/04/strings_old_vs_new.png</image:loc><image:title>strings_old_vs_new</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/04/new_agents.png</image:loc><image:title>new_agents</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/04/client_control_url.png</image:loc><image:title>client_control_url</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/04/admin_ui_url.png</image:loc><image:title>admin_ui_url</image:title></image:image><lastmod>2015-04-05T10:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/02/13/usb-forensic-roadmap/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/02/usb_forensics.png</image:loc><image:title>USB_Forensics</image:title></image:image><lastmod>2015-02-13T12:15:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/01/20/windows-xp-restore-points/</loc><lastmod>2015-01-20T22:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2015/01/03/sans-christmas-hacking-challenge/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/stan.jpg</image:loc><image:title>stan</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/vmqs8o.jpg</image:loc><image:title>vmqs8o</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/stega_secret.png</image:loc><image:title>stega_secret</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/f5_steg_instructions.png</image:loc><image:title>f5_steg_instructions</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/crutches_exif.png</image:loc><image:title>crutches_exif</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/exif_curtains.png</image:loc><image:title>exif_curtains</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/cewl.png</image:loc><image:title>cewl</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/website_hint.png</image:loc><image:title>website_hint</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/password_required.png</image:loc><image:title>password_required</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2015/01/tadaa.jpg</image:loc><image:title>tadaa</image:title></image:image><lastmod>2018-06-16T16:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/12/04/mounted-devices-key/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/12/hxd-output.png</image:loc><image:title>hxd output</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/12/g-drive-hex.png</image:loc><image:title>G drive hex</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/12/d-drive-hex.png</image:loc><image:title>D drive hex</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/12/c-drive-hex.png</image:loc><image:title>C drive hex</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/12/mounted-devices-usb-ascii.png</image:loc><image:title>mounted devices usb ascii</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/12/mounted-devices.png</image:loc><image:title>Mounted Devices</image:title></image:image><lastmod>2018-06-25T09:39:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/15/usb-forensics-pt-5-determine-the-drive-letter/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/registry_viewer_mounted_devices_local.png</image:loc><image:title>Registry_Viewer_Mounted_Devices_Local</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/registry_viewer_mounted_devices.png</image:loc><image:title>Registry_Viewer_Mounted_Devices</image:title></image:image><lastmod>2014-11-26T13:49:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/11/25/usb-forensics-update/</loc><lastmod>2014-11-25T15:33:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/08/usb-forensics-pt-4-volume-serial-number/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/vol_output.png</image:loc><image:title>Vol_output</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/emdmgmt_serial_number.png</image:loc><image:title>EMDMgmt_Serial_Number</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/emdmgmt_tree.png</image:loc><image:title>EMDMgmt_Tree</image:title></image:image><lastmod>2014-11-25T15:14:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/11/09/research-decoding-lanmanservershares/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/11/type_breakdown.png</image:loc><image:title>Type_Breakdown</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/11/permissions_field.png</image:loc><image:title>Permissions_Field</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/11/win8_caching_options.png</image:loc><image:title>Win8_Caching_Options</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/11/win7_cache_options.png</image:loc><image:title>Win7_Cache_Options</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/11/csc_breakdown.png</image:loc><image:title>CSC_Breakdown</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/11/data_breakdown1.png</image:loc><image:title>Data_Breakdown</image:title></image:image><lastmod>2019-08-17T20:48:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/07/usb-forensics-pt-3-discover-the-volume-name/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/windows_portable_devices_mydrive_name.png</image:loc><image:title>Windows_Portable_Devices_MyDrive_Name</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/windows_portable_devices_name.png</image:loc><image:title>Windows_Portable_Devices_Name</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/usbstor_partmgr.png</image:loc><image:title>USBStor_PartMgr</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/windows_portable_devices1.png</image:loc><image:title>Windows_Portable_Devices</image:title></image:image><lastmod>2015-01-14T12:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/10/03/google-analytic-cookies/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/10/cookies_utmb_table.png</image:loc><image:title>Cookies_UTMB_Table</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/10/cookies_utma_table.png</image:loc><image:title>Cookies_UTMA_Table</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/10/cookies_utma_expire_timer.png</image:loc><image:title>Cookies_UTMA_Expire_Timer</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/10/cookies_utma_www_host.png</image:loc><image:title>Cookies_UTMA_WWW_Host</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/10/cookies_utma_www_domain.png</image:loc><image:title>Cookies_UTMA_WWW_Domain</image:title></image:image><lastmod>2014-10-03T22:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/09/14/linkfiles/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/09/recent_properties2.png</image:loc><image:title>Recent_Properties2</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/09/recent_properties1.png</image:loc><image:title>Recent_Properties</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/09/recent.png</image:loc><image:title>Recent</image:title></image:image><lastmod>2014-09-14T21:48:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/09/06/jump-lists/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/09/jump_list4.png</image:loc><image:title>jump_list4</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/09/jump_list2.jpg</image:loc><image:title>Jump_List2</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/09/jump_list1.png</image:loc><image:title>Jump_List1</image:title></image:image><lastmod>2014-09-06T15:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/09/06/incident-response-process-phase-3-containment/</loc><lastmod>2014-09-06T12:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/09/03/photos-and-who-to-blame/</loc><lastmod>2014-09-03T09:49:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/08/20/incident-response-process-phase-2-identification/</loc><lastmod>2014-08-20T18:47:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/08/07/preparation/</loc><lastmod>2014-08-10T09:40:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/08/07/incident-response-process/</loc><lastmod>2014-08-07T20:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/25/chrome-basics/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/chrome_transition_values.png</image:loc><image:title>chrome_transition_values</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/chrome_artefact_locations.png</image:loc><image:title>chrome_artefact_locations</image:title></image:image><lastmod>2014-06-25T19:16:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/22/internet-explorer-basics/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/internet_explorer_w81_artefacts.png</image:loc><image:title>Internet_Explorer_W81_Artefacts</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/internet_explorer_w8_artefacts.png</image:loc><image:title>Internet_Explorer_W8_Artefacts</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/internet_explorer_w7_artefacts.png</image:loc><image:title>Internet_Explorer_W7_Artefacts</image:title></image:image><lastmod>2014-06-22T16:27:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/20/mozilla-firefox-basics/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/firefox_sqlite_locations.png</image:loc><image:title>Firefox_SQLite_Locations</image:title></image:image><lastmod>2014-06-21T10:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/18/usb-forensics-final-part-aka-pt-7-device-firstlast-plugged-in/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/setupapi_first_plugged_in_for4081.png</image:loc><image:title>Setupapi_First_Plugged_In_FOR408</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/setupapi_first_plugged_in_for408.png</image:loc><image:title>Setupapi_First_Plugged_In_FOR408</image:title></image:image><lastmod>2014-06-18T22:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/17/usb-forensics-pt-6-which-user-account-used-the-usb-device/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/guid_seagate.png</image:loc><image:title>GUID_Seagate</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/freeagent_icon.png</image:loc><image:title>Freeagent_Icon</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/registry_viewer_ntuser_mountpoints2_freeagent.png</image:loc><image:title>Registry_Viewer_NTUser_Mountpoints2_FreeAgent</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/registry_viewer_ntuser_mountpoints2.png</image:loc><image:title>Registry_Viewer_NTUser_Mountpoints2</image:title></image:image><lastmod>2014-06-17T20:39:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/21/operating-system-version-and-banners/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_os_version2.png</image:loc><image:title>Registry_Viewer_OS_Version</image:title></image:image><lastmod>2014-06-15T22:02:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/20/security-wizardry/</loc><lastmod>2014-06-15T22:01:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/21/computer-name-timezone-current-control-set/</loc><lastmod>2014-06-15T22:01:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/07/usb-forensics-pt-2-vendor-id-vid-product-id-pid/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/usb_key_tree_vid_pid.png</image:loc><image:title>USB_Key_Tree_VID_PID</image:title></image:image><lastmod>2014-06-07T11:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/06/05/usb-forensics-pt-1-serial-number/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/06/usbstor_tree.png</image:loc><image:title>USBStor_Tree</image:title></image:image><lastmod>2021-02-25T20:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/23/network-history-and-decoding-system-time/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/dcode_date_screenshot.png</image:loc><image:title>DCode_Date_Screenshot</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_128bit_system_time_hex.png</image:loc><image:title>registry_Viewer_128bit_System_Time_Hex</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/dcode_date_icon.png</image:loc><image:title>DCode_Date_Icon</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_network_profiles.png</image:loc><image:title>Registry_Viewer_Network_Profiles</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_signatures_unmanaged.png</image:loc><image:title>Registry_Viewer_Signatures_Unmanaged</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_network_nla1.png</image:loc><image:title>Registry_Viewer_Network_NLA</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_networkcards_key.png</image:loc><image:title>Registry_Viewer_NetworkCards_Key</image:title></image:image><lastmod>2014-05-29T20:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/29/regback-folder-update-times/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/event_log_regback_defrag.png</image:loc><image:title>Event_Log_Regback_Defrag</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/event_log_regback_cleared_details.png</image:loc><image:title>Event_Log_Regback_Cleared_Details</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/event_log_regback_cleared.png</image:loc><image:title>Event_Log_Regback_Cleared</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/regback_folder21.png</image:loc><image:title>Regback_Folder2</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/action_centre_maintenance.png</image:loc><image:title>Action_Centre_Maintenance</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/control_panel_action_centre.png</image:loc><image:title>Control_Panel_Action_Centre</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/regback_folder.png</image:loc><image:title>Regback_Folder</image:title></image:image><lastmod>2014-05-29T20:42:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/28/odd-things-with-hive-files/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/system_hive_update_time.png</image:loc><image:title>System_Hive_Update_Time</image:title></image:image><lastmod>2014-05-29T18:40:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/29/hives-and-tools-and-timestamps-oh-my/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/ftkimager_live_capture.png</image:loc><image:title>FTKImager_Live_Capture</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/hive_comparison.png</image:loc><image:title>Hive_Comparison</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/exif_tool_system_hive.png</image:loc><image:title>Exif_Tool_System_Hive</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_usbstor.png</image:loc><image:title>Registry_Viewer_USBStor</image:title></image:image><lastmod>2014-05-29T18:39:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/19/hats-off-security-blog/</loc><lastmod>2014-05-28T19:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/19/windows-registry-the-basics/</loc><lastmod>2014-05-28T19:58:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/20/registry-key-last-write-time/</loc><lastmod>2020-10-01T17:15:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/21/using-the-sam-hive-to-profile-user-accounts/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_sam_users1.png</image:loc><image:title>Registry_Viewer_SAM_Users</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/regripper_sam_report.png</image:loc><image:title>regripper_SAM_report</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/regripper_sam.png</image:loc><image:title>regripper_SAM</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/saminside_output1.png</image:loc><image:title>SAMInside_Output</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/regripper_icon.png</image:loc><image:title>regripper_Icon</image:title></image:image><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/saminsider_icon.png</image:loc><image:title>SAMInsider_Icon</image:title></image:image><lastmod>2016-06-01T05:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com/2014/05/23/network-interfaces/</loc><image:image><image:loc>https://hatsoffsecurity.com/wp-content/uploads/2014/05/registry_viewer_interfaces.png</image:loc><image:title>Registry_Viewer_Interfaces</image:title></image:image><lastmod>2014-05-28T19:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://hatsoffsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-09-07T13:38:34+00:00</lastmod></url></urlset>
