432 episodes

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

Digital Forensic Survival Podcast Digital Forensic Survival Podcast

    • Technology

Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.

    DFSP # 433 - SU DOs and DONTS

    DFSP # 433 - SU DOs and DONTS

    On a Linux or Mac system, there can be user accounts that have the ability of privilege escalation. Knowing how to triage, for this has a twofold benefit: (1) you obviously want to know which account may elevate to route privileges. If you're doing account triage, these are the ones you should prioritize. The other benefit (2) is to identify any account that can escalate. This fact alone ...

    • 20 min
    DFSP # 432 - Control Bits

    DFSP # 432 - Control Bits

    TCP control bits are part of the TCP header and are used to manage the connection between two devices. These control bits are single-bit flags that indicate various aspects of the TCP connection and are important for understanding and analyzing network traffic...

    • 24 min
    DFSP # 431 - Finding Needles

    DFSP # 431 - Finding Needles

    The time it takes from an initial escalation to the initial discovery of compromise is a key metric. Teams strive to do this as quickly as possible, but there are a number of challenges. You do not know what you're going to be handed, but you're pretty much guaranteed It's going to be a unique set of circumstances that require some type of customized or mostly customized response. So how do you accomplish this? Most analyst rely on a set of tried and true various techniques that can be used at scale. This week I'm going to cover a few of them, each being a critical technique you should be familiar with for forensic investigations...

    • 22 min
    DFSP # 430 - Targeting Tasks

    DFSP # 430 - Targeting Tasks

    Windows Scheduled Tasks are often used by attackers to establish persistence. As an analyst, you want to be aware of the different windows event codes that record these details. These artifacts come up in just about every windows compromise assessment, consider them core triage skills. There are several events, all of which I will go over in this episode. I will break them down from a DFIR point of view and give you the triage methodology...

    • 18 min
    DFSP # 429 - Career Moves

    DFSP # 429 - Career Moves

    This week I talk about career moves for the DFIR professional. The skill set is valuable, but it must be combined with the right additional technical skills to maximize future job opportunities. Of course, there is one skill set that stands out above the rest...

    • 22 min
    DFSP # 428 - It’s all about that XML

    DFSP # 428 - It’s all about that XML

    When you're triaging a Windows system for evidence of compromise, it's ideal if your plan is focused on some quick wins upfront. There are certain artifacts that offer this opportunity, and Windows Events for New Scheduled Tasks are one of them. Sometimes overlooked, at least in part, because the good stuff contained within the XML portion of the log. This week I'm covering the artifact from a DFIR point of view, I'll go over all the elements of the log entry that are of interest for investigations, and I'll provide a triage methodology that you can employ to find evidence quickly.

    • 27 min

You Might Also Like

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Forensic Focus
Forensic Focus: Digital Forensics, Incident Response, DFIR
CyberWire Daily
N2K Networks
Malicious Life
Malicious Life
Click Here
Recorded Future News
Hacked
Hacked