427 Folgen

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

Digital Forensic Survival Podcast Digital Forensic Survival Podcast

    • Technologie

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

    DFSP # 428 - It’s all about that XML

    DFSP # 428 - It’s all about that XML

    When you're triaging a Windows system for evidence of compromise, it's ideal if your plan is focused on some quick wins upfront. There are certain artifacts that offer this opportunity, and Windows Events for New Scheduled Tasks are one of them. Sometimes overlooked, at least in part, because the good stuff contained within the XML portion of the log. This week I'm covering the artifact from a DFIR point of view, I'll go over all the elements of the log entry that are of interest for investigations, and I'll provide a triage methodology that you can employ to find evidence quickly.

    • 27 Min.
    DFSP # 427 - MOF Balls

    DFSP # 427 - MOF Balls

    Windows management instrumentation, also known as WMI, is an App on Windows that allows a user to query all sorts of things about a system. Being native to Windows, it is an attractive target for a attackers to leverage. This week I'll break down the artifact from a DFIR point of a few and talk about how to detect its misuse.

    • 31 Min.
    DFSP # 426 - SSH Forensics: Log Analysis

    DFSP # 426 - SSH Forensics: Log Analysis

    This week I'm wrapping up my series on SSH forensics with a discussion on SSH log triage. Logs are usually what an analyst will start with, so this episode is important. There are a few different log types, and there is a pitfall with one of them, which is something you must be aware of to avoid making inaccurate conclusions. I'll provide the artifact breakdown, triage methodology, and more.

    • 22 Min.
    DFSP # 425 - SSH Forensics: Host-Based Artifacts

    DFSP # 425 - SSH Forensics: Host-Based Artifacts

    In the last episode on this topic, I covered SSH from a investigation point of view. I explained SSH and the artifacts that typically come up when your investigating. In this episode, we're getting into the triage methodology. This includes the artifacts targeted for a fast, but yet effective triage for notable SSH activity on a given host.

    • 30 Min.
    DFSP # 424 - SSH Forensics: Understanding Secure Shell

    DFSP # 424 - SSH Forensics: Understanding Secure Shell

    SSH is a protocol used to secure remote access to systems, making it a cornerstone in safeguarding sensitive information and ensuring secure communications. In this podcast, we will delve into the basics of SSH, its key concepts and other useful elements important for context when investigating for notable SSH activity.

    • 23 Min.
    DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle

    DFSP # 423 - Guiding Lights: Cyber Investigations Investigation Lifecycle

    This week I'm discussing a fundamental aspect of cybersecurity: incident response preparation. Effective incident response is paramount, and preparation is the key to success. This preparation includes comprehensive documentation, training, having the right tools and resources in place, and developing incident response plans and playbooks. It also involves ensuring clear communication protocols and conducting regular training and testing. 
    I'll explore preparation from the perspective of the investigation life cycle, where success is the reward for preparation. Join me as I uncover the importance of preparation in incident response and how it lays the foundation for success in investigations.

    • 30 Min.

Top‑Podcasts in Technologie

Apfelfunk
Malte Kirchner & Jean-Claude Frick
Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
Flugforensik - Abstürze und ihre Geschichte
Flugforensik
Ö1 matrix
ORF Ö1
Deep Questions with Cal Newport
Cal Newport

Das gefällt dir vielleicht auch

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
CyberWire Daily
N2K Networks
Security Now (Audio)
TWiT
Smashing Security
Graham Cluley & Carole Theriault
Cyber Security Headlines
CISO Series
Defense in Depth
David Spark