Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Digital Forensic Survival Podcast
…
continue reading
…
continue reading
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
…
continue reading
…
continue reading
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading

1
DFSP # 482 Unlocking Clues from Bash and Hidden Keys
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41This week, we’re pulling back the curtain on SSH from a digital forensics perspective.
…
continue reading
In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
…
continue reading