DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle
This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation....
30:50
DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle
This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation....
30:50
DFSP # 422 - EVTX Express: Cracking into Windows Logs Like a Pro
Today I'm talking Windows forensics, focusing on Windows event logs. These logs are very valuable...
21:06
DFSP # 421 - Memory Lane: Fileless Linux Attacks Unraveled
In this podcast episode, we talk about Linux's `memfd` – a virtual file system allowing the...
25:41
DFSP # 420 - Failing, Stopping and Crashing
This week we explore into the world of Windows service event codes and their role in forensic...
22:29
This week, we're delving into the realm of fast flux, a cunning technique employed by attackers...
27:48
DFSP # 418 - Core Insights: Navigating MFT in Forensics
In this week's exploration, I'm delving into the intricate realm of the Master File Table (MFT),...
22:09
DFSP # 417 - Unlocking Linux Secrets
This week I delve into the intriguing domain of Linux malware triage. The Linux platform presents...
32:19
DFSP # 416 - Persistence Mechanisms on Windows
This week I’m going to talk about New Service Installation details recorded in Windows event...
25:55
DFSP # 415 - Dealing with Third-Party Incidents
Organizations leverage third-party services more and more for business advantages. For the...
20:31
Cron become important and Linux forensics when you’re talking about persistence. Think scheduled...
14:17
DFSP # 413 - Ransomware Initial Response
Ransomware cases can be particularly challenging, especially during the initial response. They...
16:54
DFSP # 412 - Conhost Forensics
Conhost, or the Console Application Host, often comes up during investigations. Understanding...
19:01
DFSP # 411 - NTLM Credential Validation
This week I'm talking about detecting evidence of lateral movement on Window systems using NTLM...
18:08
DFSP # 410 - Linux Temp Directories
Temporary directories play a significant role in computer forensic investigations as they can...
15:37
DFSP # 409 - Regsvcs and Regasm Abuse
This week I’m talking about Regsvcs /Regasm exploitation, which is a Windows tactic attackers use...
11:13
This week I’m talking about Nested Groups and the risk they pose for security. Built-in to the...
13:21
DFSP # 407 - More About Lateral Movement and Kerberos
This week it's more about lateral movement and kerberos events.
19:20
DFSP # 406 - All the BIN Directories
In a typical Linux "bin" directory, you can find various types of executable files and scripts...
14:48
Werfault is in interesting artifact in that there is not a lot of documentation on it but yet it...
14:38
Certutil, a powerful command-line utility, possesses the potential for misuse by malicious actors...
12:18
Vol.40 小米SU7价格公布,一天“大定”量
Episodio
Un fracaso de Apple - NLC 078
Episodio