Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Digital Forensic Survival Podcast
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
…
continue reading
…
continue reading
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading

1
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
…
continue reading
In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
…
continue reading
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
…
continue reading