Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading

1
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
20:41
20:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
20:41This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
…
continue reading

1
DFSP # 481 Triage outside the Core
20:08
20:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
20:08In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
…
continue reading

1
DFSP # 480 Hidden risks of nested groups
13:59
13:59
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
13:59This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...…
…
continue reading

1
DFSP # 479 Scan, Score, Secure
15:48
15:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:48One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
…
continue reading
In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...
…
continue reading
In this episode, we’ll take a focused look at how to triage one of the most commonly targeted Windows processes: svchost.exe. While the methods in this series generally apply to all Windows core processes, svchost is an especially important case because attackers...
…
continue reading
Ransomware attacks move quickly, making your initial response crucial in minimizing impact. This episode outlines critical first steps, from isolating infected machines to gathering key information and initiating containment. Whether you’re a SOC analyst, incident responder, or the first to notice an attack, this framework is designed to help you r…
…
continue reading
Today’s episode explores Apple Spotlight and its extended metadata—a powerful yet often overlooked forensic tool in the Mac ecosystem. Spotlight plays a critical role in uncovering digital evidence on macOS. Both experienced forensic analysts and newcomers will find its capabilities essential. Let’s dive into the details.…
…
continue reading
BIN directories (short for binary) store command binaries like CD, PWD, LS, Vi, and CAT. Every platform has multiple BIN directories: two in the root directory and two in each user directory. This episode explains the types of files in these directories and the purpose of each BIN directory. I will also clarify which directories are typically used …
…
continue reading

1
DFSP # 472 - Windows Usual Suspects
16:35
16:35
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
16:35Modern Windows systems use a tightly coordinated sequence of core processes to establish secure system and user environments. DFIR investigators and incident responders must understand the interrelationships between processes such as Idle, SMSS, CSRSS, WININIT, and WINLOGON. Recognizing expected behaviors and anomalies in these steps is crucial for…
…
continue reading
Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...
…
continue reading

1
DFSP # 470 The Windows Taskhosts
17:33
17:33
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
17:33This week I'm talking about the three task hosts. These are Windows core files, and they share not only similar names, but similar functionality. Because of this, there is the potential for confusion, which may allow an attacker to leverage these similarities and mask they are malware. My goal in this episode is to demystify the three different tas…
…
continue reading

1
DFSP # 469 Network Blocked Activity
21:59
21:59
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
21:59Today’s episode is all about Windows event logs that record blocked network connections. Blocked network events are interesting because they might signal that an attacker’s secondary or tertiary toolset isn’t working as intended. That’s good news from a security standpoint...
…
continue reading

1
DFSP # 468 Data Brokers & Ransomware
28:24
28:24
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:24Today I cover an evolving threat in the cybersecurity world: data brokers. From a computer forensics standpoint, this threats pose unique challenges. While breaches capture headlines, data brokers play a major (and sometimes overlooked) role in fueling cybercrime. In this session, we will explore how these threats operate, why they are dangerous, a…
…
continue reading
The Common Vulnerability Scoring System (CVSS) is a powerful tool for assessing the severity and impact of security vulnerabilities. In digital forensics and incident response, CVSS scores can provide critical context to prioritize investigations and focus on the most significant risks. This episode I will explore how leveraging CVSS scoring enhanc…
…
continue reading

1
DFSP # 466 Malware Triage for File Types
23:54
23:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:54Understanding the behavior and characteristics of common file types used in attacks, such as executables, scripts, and document files, is essential for effective analysis. In this episode, we will explore practical approaches to triage malware, focusing on key indicators and techniques for prioritizing investigations.…
…
continue reading